repo stringlengths 6 47 | file_url stringlengths 77 269 | file_path stringlengths 5 186 | content stringlengths 0 32.8k | language stringclasses 1
value | license stringclasses 7
values | commit_sha stringlengths 40 40 | retrieved_at stringdate 2026-01-07 08:35:43 2026-01-07 08:55:24 | truncated bool 2
classes |
|---|---|---|---|---|---|---|---|---|
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/mocks/eth.mock.go | mocks/eth.mock.go | // Code generated by counterfeiter. DO NOT EDIT.
package mocks
import (
"context"
"sync"
"github.com/RTradeLtd/grpc/pay"
"github.com/RTradeLtd/grpc/pay/request"
"github.com/RTradeLtd/grpc/pay/response"
"google.golang.org/grpc"
)
type FakeSignerClient struct {
GetSignedMessageStub func(context.Context, *request.SignRequest, ...grpc.CallOption) (*response.SignResponse, error)
getSignedMessageMutex sync.RWMutex
getSignedMessageArgsForCall []struct {
arg1 context.Context
arg2 *request.SignRequest
arg3 []grpc.CallOption
}
getSignedMessageReturns struct {
result1 *response.SignResponse
result2 error
}
getSignedMessageReturnsOnCall map[int]struct {
result1 *response.SignResponse
result2 error
}
invocations map[string][][]interface{}
invocationsMutex sync.RWMutex
}
func (fake *FakeSignerClient) GetSignedMessage(arg1 context.Context, arg2 *request.SignRequest, arg3 ...grpc.CallOption) (*response.SignResponse, error) {
fake.getSignedMessageMutex.Lock()
ret, specificReturn := fake.getSignedMessageReturnsOnCall[len(fake.getSignedMessageArgsForCall)]
fake.getSignedMessageArgsForCall = append(fake.getSignedMessageArgsForCall, struct {
arg1 context.Context
arg2 *request.SignRequest
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("GetSignedMessage", []interface{}{arg1, arg2, arg3})
fake.getSignedMessageMutex.Unlock()
if fake.GetSignedMessageStub != nil {
return fake.GetSignedMessageStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.getSignedMessageReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeSignerClient) GetSignedMessageCallCount() int {
fake.getSignedMessageMutex.RLock()
defer fake.getSignedMessageMutex.RUnlock()
return len(fake.getSignedMessageArgsForCall)
}
func (fake *FakeSignerClient) GetSignedMessageCalls(stub func(context.Context, *request.SignRequest, ...grpc.CallOption) (*response.SignResponse, error)) {
fake.getSignedMessageMutex.Lock()
defer fake.getSignedMessageMutex.Unlock()
fake.GetSignedMessageStub = stub
}
func (fake *FakeSignerClient) GetSignedMessageArgsForCall(i int) (context.Context, *request.SignRequest, []grpc.CallOption) {
fake.getSignedMessageMutex.RLock()
defer fake.getSignedMessageMutex.RUnlock()
argsForCall := fake.getSignedMessageArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeSignerClient) GetSignedMessageReturns(result1 *response.SignResponse, result2 error) {
fake.getSignedMessageMutex.Lock()
defer fake.getSignedMessageMutex.Unlock()
fake.GetSignedMessageStub = nil
fake.getSignedMessageReturns = struct {
result1 *response.SignResponse
result2 error
}{result1, result2}
}
func (fake *FakeSignerClient) GetSignedMessageReturnsOnCall(i int, result1 *response.SignResponse, result2 error) {
fake.getSignedMessageMutex.Lock()
defer fake.getSignedMessageMutex.Unlock()
fake.GetSignedMessageStub = nil
if fake.getSignedMessageReturnsOnCall == nil {
fake.getSignedMessageReturnsOnCall = make(map[int]struct {
result1 *response.SignResponse
result2 error
})
}
fake.getSignedMessageReturnsOnCall[i] = struct {
result1 *response.SignResponse
result2 error
}{result1, result2}
}
func (fake *FakeSignerClient) Invocations() map[string][][]interface{} {
fake.invocationsMutex.RLock()
defer fake.invocationsMutex.RUnlock()
fake.getSignedMessageMutex.RLock()
defer fake.getSignedMessageMutex.RUnlock()
copiedInvocations := map[string][][]interface{}{}
for key, value := range fake.invocations {
copiedInvocations[key] = value
}
return copiedInvocations
}
func (fake *FakeSignerClient) recordInvocation(key string, args []interface{}) {
fake.invocationsMutex.Lock()
defer fake.invocationsMutex.Unlock()
if fake.invocations == nil {
fake.invocations = map[string][][]interface{}{}
}
if fake.invocations[key] == nil {
fake.invocations[key] = [][]interface{}{}
}
fake.invocations[key] = append(fake.invocations[key], args)
}
var _ pay.SignerClient = new(FakeSignerClient)
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/mocks/orchestrator.mock.go | mocks/orchestrator.mock.go | // Code generated by counterfeiter. DO NOT EDIT.
package mocks
import (
"context"
"sync"
"github.com/RTradeLtd/grpc/nexus"
"google.golang.org/grpc"
)
type FakeServiceClient struct {
NetworkDiagnosticsStub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.NetworkDiagnosticsResponse, error)
networkDiagnosticsMutex sync.RWMutex
networkDiagnosticsArgsForCall []struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}
networkDiagnosticsReturns struct {
result1 *nexus.NetworkDiagnosticsResponse
result2 error
}
networkDiagnosticsReturnsOnCall map[int]struct {
result1 *nexus.NetworkDiagnosticsResponse
result2 error
}
NetworkStatsStub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.NetworkStatusReponse, error)
networkStatsMutex sync.RWMutex
networkStatsArgsForCall []struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}
networkStatsReturns struct {
result1 *nexus.NetworkStatusReponse
result2 error
}
networkStatsReturnsOnCall map[int]struct {
result1 *nexus.NetworkStatusReponse
result2 error
}
PingStub func(context.Context, *nexus.Empty, ...grpc.CallOption) (*nexus.Empty, error)
pingMutex sync.RWMutex
pingArgsForCall []struct {
arg1 context.Context
arg2 *nexus.Empty
arg3 []grpc.CallOption
}
pingReturns struct {
result1 *nexus.Empty
result2 error
}
pingReturnsOnCall map[int]struct {
result1 *nexus.Empty
result2 error
}
RemoveNetworkStub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.Empty, error)
removeNetworkMutex sync.RWMutex
removeNetworkArgsForCall []struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}
removeNetworkReturns struct {
result1 *nexus.Empty
result2 error
}
removeNetworkReturnsOnCall map[int]struct {
result1 *nexus.Empty
result2 error
}
StartNetworkStub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.StartNetworkResponse, error)
startNetworkMutex sync.RWMutex
startNetworkArgsForCall []struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}
startNetworkReturns struct {
result1 *nexus.StartNetworkResponse
result2 error
}
startNetworkReturnsOnCall map[int]struct {
result1 *nexus.StartNetworkResponse
result2 error
}
StopNetworkStub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.Empty, error)
stopNetworkMutex sync.RWMutex
stopNetworkArgsForCall []struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}
stopNetworkReturns struct {
result1 *nexus.Empty
result2 error
}
stopNetworkReturnsOnCall map[int]struct {
result1 *nexus.Empty
result2 error
}
UpdateNetworkStub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.Empty, error)
updateNetworkMutex sync.RWMutex
updateNetworkArgsForCall []struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}
updateNetworkReturns struct {
result1 *nexus.Empty
result2 error
}
updateNetworkReturnsOnCall map[int]struct {
result1 *nexus.Empty
result2 error
}
invocations map[string][][]interface{}
invocationsMutex sync.RWMutex
}
func (fake *FakeServiceClient) NetworkDiagnostics(arg1 context.Context, arg2 *nexus.NetworkRequest, arg3 ...grpc.CallOption) (*nexus.NetworkDiagnosticsResponse, error) {
fake.networkDiagnosticsMutex.Lock()
ret, specificReturn := fake.networkDiagnosticsReturnsOnCall[len(fake.networkDiagnosticsArgsForCall)]
fake.networkDiagnosticsArgsForCall = append(fake.networkDiagnosticsArgsForCall, struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("NetworkDiagnostics", []interface{}{arg1, arg2, arg3})
fake.networkDiagnosticsMutex.Unlock()
if fake.NetworkDiagnosticsStub != nil {
return fake.NetworkDiagnosticsStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.networkDiagnosticsReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeServiceClient) NetworkDiagnosticsCallCount() int {
fake.networkDiagnosticsMutex.RLock()
defer fake.networkDiagnosticsMutex.RUnlock()
return len(fake.networkDiagnosticsArgsForCall)
}
func (fake *FakeServiceClient) NetworkDiagnosticsCalls(stub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.NetworkDiagnosticsResponse, error)) {
fake.networkDiagnosticsMutex.Lock()
defer fake.networkDiagnosticsMutex.Unlock()
fake.NetworkDiagnosticsStub = stub
}
func (fake *FakeServiceClient) NetworkDiagnosticsArgsForCall(i int) (context.Context, *nexus.NetworkRequest, []grpc.CallOption) {
fake.networkDiagnosticsMutex.RLock()
defer fake.networkDiagnosticsMutex.RUnlock()
argsForCall := fake.networkDiagnosticsArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeServiceClient) NetworkDiagnosticsReturns(result1 *nexus.NetworkDiagnosticsResponse, result2 error) {
fake.networkDiagnosticsMutex.Lock()
defer fake.networkDiagnosticsMutex.Unlock()
fake.NetworkDiagnosticsStub = nil
fake.networkDiagnosticsReturns = struct {
result1 *nexus.NetworkDiagnosticsResponse
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) NetworkDiagnosticsReturnsOnCall(i int, result1 *nexus.NetworkDiagnosticsResponse, result2 error) {
fake.networkDiagnosticsMutex.Lock()
defer fake.networkDiagnosticsMutex.Unlock()
fake.NetworkDiagnosticsStub = nil
if fake.networkDiagnosticsReturnsOnCall == nil {
fake.networkDiagnosticsReturnsOnCall = make(map[int]struct {
result1 *nexus.NetworkDiagnosticsResponse
result2 error
})
}
fake.networkDiagnosticsReturnsOnCall[i] = struct {
result1 *nexus.NetworkDiagnosticsResponse
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) NetworkStats(arg1 context.Context, arg2 *nexus.NetworkRequest, arg3 ...grpc.CallOption) (*nexus.NetworkStatusReponse, error) {
fake.networkStatsMutex.Lock()
ret, specificReturn := fake.networkStatsReturnsOnCall[len(fake.networkStatsArgsForCall)]
fake.networkStatsArgsForCall = append(fake.networkStatsArgsForCall, struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("NetworkStats", []interface{}{arg1, arg2, arg3})
fake.networkStatsMutex.Unlock()
if fake.NetworkStatsStub != nil {
return fake.NetworkStatsStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.networkStatsReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeServiceClient) NetworkStatsCallCount() int {
fake.networkStatsMutex.RLock()
defer fake.networkStatsMutex.RUnlock()
return len(fake.networkStatsArgsForCall)
}
func (fake *FakeServiceClient) NetworkStatsCalls(stub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.NetworkStatusReponse, error)) {
fake.networkStatsMutex.Lock()
defer fake.networkStatsMutex.Unlock()
fake.NetworkStatsStub = stub
}
func (fake *FakeServiceClient) NetworkStatsArgsForCall(i int) (context.Context, *nexus.NetworkRequest, []grpc.CallOption) {
fake.networkStatsMutex.RLock()
defer fake.networkStatsMutex.RUnlock()
argsForCall := fake.networkStatsArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeServiceClient) NetworkStatsReturns(result1 *nexus.NetworkStatusReponse, result2 error) {
fake.networkStatsMutex.Lock()
defer fake.networkStatsMutex.Unlock()
fake.NetworkStatsStub = nil
fake.networkStatsReturns = struct {
result1 *nexus.NetworkStatusReponse
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) NetworkStatsReturnsOnCall(i int, result1 *nexus.NetworkStatusReponse, result2 error) {
fake.networkStatsMutex.Lock()
defer fake.networkStatsMutex.Unlock()
fake.NetworkStatsStub = nil
if fake.networkStatsReturnsOnCall == nil {
fake.networkStatsReturnsOnCall = make(map[int]struct {
result1 *nexus.NetworkStatusReponse
result2 error
})
}
fake.networkStatsReturnsOnCall[i] = struct {
result1 *nexus.NetworkStatusReponse
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) Ping(arg1 context.Context, arg2 *nexus.Empty, arg3 ...grpc.CallOption) (*nexus.Empty, error) {
fake.pingMutex.Lock()
ret, specificReturn := fake.pingReturnsOnCall[len(fake.pingArgsForCall)]
fake.pingArgsForCall = append(fake.pingArgsForCall, struct {
arg1 context.Context
arg2 *nexus.Empty
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("Ping", []interface{}{arg1, arg2, arg3})
fake.pingMutex.Unlock()
if fake.PingStub != nil {
return fake.PingStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.pingReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeServiceClient) PingCallCount() int {
fake.pingMutex.RLock()
defer fake.pingMutex.RUnlock()
return len(fake.pingArgsForCall)
}
func (fake *FakeServiceClient) PingCalls(stub func(context.Context, *nexus.Empty, ...grpc.CallOption) (*nexus.Empty, error)) {
fake.pingMutex.Lock()
defer fake.pingMutex.Unlock()
fake.PingStub = stub
}
func (fake *FakeServiceClient) PingArgsForCall(i int) (context.Context, *nexus.Empty, []grpc.CallOption) {
fake.pingMutex.RLock()
defer fake.pingMutex.RUnlock()
argsForCall := fake.pingArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeServiceClient) PingReturns(result1 *nexus.Empty, result2 error) {
fake.pingMutex.Lock()
defer fake.pingMutex.Unlock()
fake.PingStub = nil
fake.pingReturns = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) PingReturnsOnCall(i int, result1 *nexus.Empty, result2 error) {
fake.pingMutex.Lock()
defer fake.pingMutex.Unlock()
fake.PingStub = nil
if fake.pingReturnsOnCall == nil {
fake.pingReturnsOnCall = make(map[int]struct {
result1 *nexus.Empty
result2 error
})
}
fake.pingReturnsOnCall[i] = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) RemoveNetwork(arg1 context.Context, arg2 *nexus.NetworkRequest, arg3 ...grpc.CallOption) (*nexus.Empty, error) {
fake.removeNetworkMutex.Lock()
ret, specificReturn := fake.removeNetworkReturnsOnCall[len(fake.removeNetworkArgsForCall)]
fake.removeNetworkArgsForCall = append(fake.removeNetworkArgsForCall, struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("RemoveNetwork", []interface{}{arg1, arg2, arg3})
fake.removeNetworkMutex.Unlock()
if fake.RemoveNetworkStub != nil {
return fake.RemoveNetworkStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.removeNetworkReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeServiceClient) RemoveNetworkCallCount() int {
fake.removeNetworkMutex.RLock()
defer fake.removeNetworkMutex.RUnlock()
return len(fake.removeNetworkArgsForCall)
}
func (fake *FakeServiceClient) RemoveNetworkCalls(stub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.Empty, error)) {
fake.removeNetworkMutex.Lock()
defer fake.removeNetworkMutex.Unlock()
fake.RemoveNetworkStub = stub
}
func (fake *FakeServiceClient) RemoveNetworkArgsForCall(i int) (context.Context, *nexus.NetworkRequest, []grpc.CallOption) {
fake.removeNetworkMutex.RLock()
defer fake.removeNetworkMutex.RUnlock()
argsForCall := fake.removeNetworkArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeServiceClient) RemoveNetworkReturns(result1 *nexus.Empty, result2 error) {
fake.removeNetworkMutex.Lock()
defer fake.removeNetworkMutex.Unlock()
fake.RemoveNetworkStub = nil
fake.removeNetworkReturns = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) RemoveNetworkReturnsOnCall(i int, result1 *nexus.Empty, result2 error) {
fake.removeNetworkMutex.Lock()
defer fake.removeNetworkMutex.Unlock()
fake.RemoveNetworkStub = nil
if fake.removeNetworkReturnsOnCall == nil {
fake.removeNetworkReturnsOnCall = make(map[int]struct {
result1 *nexus.Empty
result2 error
})
}
fake.removeNetworkReturnsOnCall[i] = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) StartNetwork(arg1 context.Context, arg2 *nexus.NetworkRequest, arg3 ...grpc.CallOption) (*nexus.StartNetworkResponse, error) {
fake.startNetworkMutex.Lock()
ret, specificReturn := fake.startNetworkReturnsOnCall[len(fake.startNetworkArgsForCall)]
fake.startNetworkArgsForCall = append(fake.startNetworkArgsForCall, struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("StartNetwork", []interface{}{arg1, arg2, arg3})
fake.startNetworkMutex.Unlock()
if fake.StartNetworkStub != nil {
return fake.StartNetworkStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.startNetworkReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeServiceClient) StartNetworkCallCount() int {
fake.startNetworkMutex.RLock()
defer fake.startNetworkMutex.RUnlock()
return len(fake.startNetworkArgsForCall)
}
func (fake *FakeServiceClient) StartNetworkCalls(stub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.StartNetworkResponse, error)) {
fake.startNetworkMutex.Lock()
defer fake.startNetworkMutex.Unlock()
fake.StartNetworkStub = stub
}
func (fake *FakeServiceClient) StartNetworkArgsForCall(i int) (context.Context, *nexus.NetworkRequest, []grpc.CallOption) {
fake.startNetworkMutex.RLock()
defer fake.startNetworkMutex.RUnlock()
argsForCall := fake.startNetworkArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeServiceClient) StartNetworkReturns(result1 *nexus.StartNetworkResponse, result2 error) {
fake.startNetworkMutex.Lock()
defer fake.startNetworkMutex.Unlock()
fake.StartNetworkStub = nil
fake.startNetworkReturns = struct {
result1 *nexus.StartNetworkResponse
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) StartNetworkReturnsOnCall(i int, result1 *nexus.StartNetworkResponse, result2 error) {
fake.startNetworkMutex.Lock()
defer fake.startNetworkMutex.Unlock()
fake.StartNetworkStub = nil
if fake.startNetworkReturnsOnCall == nil {
fake.startNetworkReturnsOnCall = make(map[int]struct {
result1 *nexus.StartNetworkResponse
result2 error
})
}
fake.startNetworkReturnsOnCall[i] = struct {
result1 *nexus.StartNetworkResponse
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) StopNetwork(arg1 context.Context, arg2 *nexus.NetworkRequest, arg3 ...grpc.CallOption) (*nexus.Empty, error) {
fake.stopNetworkMutex.Lock()
ret, specificReturn := fake.stopNetworkReturnsOnCall[len(fake.stopNetworkArgsForCall)]
fake.stopNetworkArgsForCall = append(fake.stopNetworkArgsForCall, struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("StopNetwork", []interface{}{arg1, arg2, arg3})
fake.stopNetworkMutex.Unlock()
if fake.StopNetworkStub != nil {
return fake.StopNetworkStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.stopNetworkReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeServiceClient) StopNetworkCallCount() int {
fake.stopNetworkMutex.RLock()
defer fake.stopNetworkMutex.RUnlock()
return len(fake.stopNetworkArgsForCall)
}
func (fake *FakeServiceClient) StopNetworkCalls(stub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.Empty, error)) {
fake.stopNetworkMutex.Lock()
defer fake.stopNetworkMutex.Unlock()
fake.StopNetworkStub = stub
}
func (fake *FakeServiceClient) StopNetworkArgsForCall(i int) (context.Context, *nexus.NetworkRequest, []grpc.CallOption) {
fake.stopNetworkMutex.RLock()
defer fake.stopNetworkMutex.RUnlock()
argsForCall := fake.stopNetworkArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeServiceClient) StopNetworkReturns(result1 *nexus.Empty, result2 error) {
fake.stopNetworkMutex.Lock()
defer fake.stopNetworkMutex.Unlock()
fake.StopNetworkStub = nil
fake.stopNetworkReturns = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) StopNetworkReturnsOnCall(i int, result1 *nexus.Empty, result2 error) {
fake.stopNetworkMutex.Lock()
defer fake.stopNetworkMutex.Unlock()
fake.StopNetworkStub = nil
if fake.stopNetworkReturnsOnCall == nil {
fake.stopNetworkReturnsOnCall = make(map[int]struct {
result1 *nexus.Empty
result2 error
})
}
fake.stopNetworkReturnsOnCall[i] = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) UpdateNetwork(arg1 context.Context, arg2 *nexus.NetworkRequest, arg3 ...grpc.CallOption) (*nexus.Empty, error) {
fake.updateNetworkMutex.Lock()
ret, specificReturn := fake.updateNetworkReturnsOnCall[len(fake.updateNetworkArgsForCall)]
fake.updateNetworkArgsForCall = append(fake.updateNetworkArgsForCall, struct {
arg1 context.Context
arg2 *nexus.NetworkRequest
arg3 []grpc.CallOption
}{arg1, arg2, arg3})
fake.recordInvocation("UpdateNetwork", []interface{}{arg1, arg2, arg3})
fake.updateNetworkMutex.Unlock()
if fake.UpdateNetworkStub != nil {
return fake.UpdateNetworkStub(arg1, arg2, arg3...)
}
if specificReturn {
return ret.result1, ret.result2
}
fakeReturns := fake.updateNetworkReturns
return fakeReturns.result1, fakeReturns.result2
}
func (fake *FakeServiceClient) UpdateNetworkCallCount() int {
fake.updateNetworkMutex.RLock()
defer fake.updateNetworkMutex.RUnlock()
return len(fake.updateNetworkArgsForCall)
}
func (fake *FakeServiceClient) UpdateNetworkCalls(stub func(context.Context, *nexus.NetworkRequest, ...grpc.CallOption) (*nexus.Empty, error)) {
fake.updateNetworkMutex.Lock()
defer fake.updateNetworkMutex.Unlock()
fake.UpdateNetworkStub = stub
}
func (fake *FakeServiceClient) UpdateNetworkArgsForCall(i int) (context.Context, *nexus.NetworkRequest, []grpc.CallOption) {
fake.updateNetworkMutex.RLock()
defer fake.updateNetworkMutex.RUnlock()
argsForCall := fake.updateNetworkArgsForCall[i]
return argsForCall.arg1, argsForCall.arg2, argsForCall.arg3
}
func (fake *FakeServiceClient) UpdateNetworkReturns(result1 *nexus.Empty, result2 error) {
fake.updateNetworkMutex.Lock()
defer fake.updateNetworkMutex.Unlock()
fake.UpdateNetworkStub = nil
fake.updateNetworkReturns = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) UpdateNetworkReturnsOnCall(i int, result1 *nexus.Empty, result2 error) {
fake.updateNetworkMutex.Lock()
defer fake.updateNetworkMutex.Unlock()
fake.UpdateNetworkStub = nil
if fake.updateNetworkReturnsOnCall == nil {
fake.updateNetworkReturnsOnCall = make(map[int]struct {
result1 *nexus.Empty
result2 error
})
}
fake.updateNetworkReturnsOnCall[i] = struct {
result1 *nexus.Empty
result2 error
}{result1, result2}
}
func (fake *FakeServiceClient) Invocations() map[string][][]interface{} {
fake.invocationsMutex.RLock()
defer fake.invocationsMutex.RUnlock()
fake.networkDiagnosticsMutex.RLock()
defer fake.networkDiagnosticsMutex.RUnlock()
fake.networkStatsMutex.RLock()
defer fake.networkStatsMutex.RUnlock()
fake.pingMutex.RLock()
defer fake.pingMutex.RUnlock()
fake.removeNetworkMutex.RLock()
defer fake.removeNetworkMutex.RUnlock()
fake.startNetworkMutex.RLock()
defer fake.startNetworkMutex.RUnlock()
fake.stopNetworkMutex.RLock()
defer fake.stopNetworkMutex.RUnlock()
fake.updateNetworkMutex.RLock()
defer fake.updateNetworkMutex.RUnlock()
copiedInvocations := map[string][][]interface{}{}
for key, value := range fake.invocations {
copiedInvocations[key] = value
}
return copiedInvocations
}
func (fake *FakeServiceClient) recordInvocation(key string, args []interface{}) {
fake.invocationsMutex.Lock()
defer fake.invocationsMutex.Unlock()
if fake.invocations == nil {
fake.invocations = map[string][][]interface{}{}
}
if fake.invocations[key] == nil {
fake.invocations[key] = [][]interface{}{}
}
fake.invocations[key] = append(fake.invocations[key], args)
}
var _ nexus.ServiceClient = new(FakeServiceClient)
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/grpc-clients/lens.go | grpc-clients/lens.go | package clients
import (
"fmt"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/grpc/dialer"
pb "github.com/RTradeLtd/grpc/lensv2"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
)
const (
defaultURL = "127.0.0.1:9998"
)
// LensClient is a lens client used to make requests to the Lens gRPC server
type LensClient struct {
conn *grpc.ClientConn
pb.LensV2Client
}
// NewLensClient is used to generate our lens client
func NewLensClient(opts config.Services) (*LensClient, error) {
dialOpts := make([]grpc.DialOption, 0)
if opts.Lens.TLS.CertPath != "" {
creds, err := credentials.NewClientTLSFromFile(opts.Lens.TLS.CertPath, "")
if err != nil {
return nil, fmt.Errorf("could not load tls cert: %s", err)
}
dialOpts = append(dialOpts,
grpc.WithTransportCredentials(creds),
grpc.WithPerRPCCredentials(dialer.NewCredentials(opts.Lens.AuthKey, true)))
} else {
dialOpts = append(dialOpts,
grpc.WithInsecure(),
grpc.WithPerRPCCredentials(dialer.NewCredentials(opts.Lens.AuthKey, false)))
}
var url string
if opts.Lens.URL == "" {
url = defaultURL
} else {
url = opts.Lens.URL
}
conn, err := grpc.Dial(url, dialOpts...)
if err != nil {
return nil, err
}
return &LensClient{
conn: conn,
LensV2Client: pb.NewLensV2Client(conn),
}, nil
}
// Close shuts down the client's gRPC connection
func (l *LensClient) Close() { l.conn.Close() }
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/grpc-clients/bch.go | grpc-clients/bch.go | package clients
import (
"fmt"
"github.com/RTradeLtd/config/v2"
pb "github.com/gcash/bchwallet/rpc/walletrpc"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
)
// BchWalletClient provides a gRPC API
// to manage a BCH wallet
type BchWalletClient struct {
pb.WalletServiceClient
conn *grpc.ClientConn
}
// NewBchWalletClient is used to instantaite our connection
// to a bchwallet daemon for wallet management functionality
func NewBchWalletClient(opts config.Services) (*BchWalletClient, error) {
dialOpts := make([]grpc.DialOption, 0)
if opts.BchGRPC.Wallet.CertFile != "" {
creds, err := credentials.NewClientTLSFromFile(opts.BchGRPC.Wallet.CertFile, "")
if err != nil {
return nil, fmt.Errorf("could not load tls cert: %s", err)
}
dialOpts = append(dialOpts, grpc.WithTransportCredentials(creds))
} else {
dialOpts = append(dialOpts, grpc.WithInsecure())
}
gConn, err := grpc.Dial(opts.BchGRPC.Wallet.URL, dialOpts...)
if err != nil {
return nil, err
}
return &BchWalletClient{pb.NewWalletServiceClient(gConn), gConn}, nil
}
// Close is used to close the gRPC connection
func (bw *BchWalletClient) Close() { bw.conn.Close() }
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/grpc-clients/orchestrator.go | grpc-clients/orchestrator.go | package clients
import (
"fmt"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/grpc/dialer"
nexus "github.com/RTradeLtd/grpc/nexus"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
)
// IPFSOrchestratorClient is a lighweight container for the orchestrator's
// gRPC API client
type IPFSOrchestratorClient struct {
nexus.ServiceClient
conn *grpc.ClientConn
}
// NewOcrhestratorClient instantiates a new orchestrator API client
func NewOcrhestratorClient(opts config.Nexus) (*IPFSOrchestratorClient, error) {
c := &IPFSOrchestratorClient{}
// set up parameters for core conn
dialOpts := make([]grpc.DialOption, 0)
if opts.TLS.CertPath != "" {
creds, err := credentials.NewClientTLSFromFile(opts.TLS.CertPath, "")
if err != nil {
return nil, fmt.Errorf("could not load tls cert: %s", err)
}
dialOpts = append(dialOpts,
grpc.WithTransportCredentials(creds),
grpc.WithPerRPCCredentials(dialer.NewCredentials(opts.Key, true)))
} else {
dialOpts = append(dialOpts,
grpc.WithInsecure(),
grpc.WithPerRPCCredentials(dialer.NewCredentials(opts.Key, false)))
}
// connect to orchestrator
var err error
c.conn, err = grpc.Dial(opts.Host+":"+opts.Port, dialOpts...)
if err != nil {
return nil, fmt.Errorf("failed to connect to core service: %s", err.Error())
}
c.ServiceClient = nexus.NewServiceClient(c.conn)
return c, nil
}
// Close shuts down the client's gRPC connection
func (i *IPFSOrchestratorClient) Close() { i.conn.Close() }
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/grpc-clients/clients_test.go | grpc-clients/clients_test.go | package clients_test
import (
"testing"
clients "github.com/RTradeLtd/Temporal/grpc-clients"
"github.com/RTradeLtd/config/v2"
)
const (
testCfgPath = "../testenv/config.json"
)
func TestLensClient_Fail(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
cfg.Services.Lens.TLS.CertPath = "fakepath"
if _, err = clients.NewLensClient(cfg.Services); err == nil {
t.Fatal("error expected")
}
}
func TestLensClient_Pass(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
if _, err = clients.NewLensClient(cfg.Services); err != nil {
t.Fatal(err)
}
}
func TestWalletService_Fail(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
cfg.Services.BchGRPC.Wallet.CertFile = "fakepath"
if _, err = clients.NewBchWalletClient(cfg.Services); err == nil {
t.Fatal("error expected")
}
}
func TestWalletService_Pass(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
if _, err = clients.NewBchWalletClient(cfg.Services); err != nil {
t.Fatal(err)
}
}
func TestSignerClient_Pass(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
if _, err = clients.NewSignerClient(cfg); err != nil {
t.Fatal(err)
}
}
func TestOrchestratorClient_Fail(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
cfg.Nexus.TLS.CertPath = "fakepath"
if _, err = clients.NewOcrhestratorClient(cfg.Nexus); err == nil {
t.Fatal("error expected")
}
}
func TestOrchestratorClient_Pass(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
if _, err = clients.NewOcrhestratorClient(cfg.Nexus); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/grpc-clients/eth.go | grpc-clients/eth.go | package clients
import (
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/grpc/dialer"
pb "github.com/RTradeLtd/grpc/pay"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
)
const (
defaultSignerURL = "127.0.0.1:9090"
)
// SignerClient is how we interface with the Signer server as a client
type SignerClient struct {
pb.SignerClient
conn *grpc.ClientConn
}
// NewSignerClient is used to instantiate our connection with our grpc payment api
func NewSignerClient(cfg *config.TemporalConfig) (*SignerClient, error) {
dialOpts := make([]grpc.DialOption, 0)
if cfg.Pay.TLS.CertPath != "" {
creds, err := credentials.NewClientTLSFromFile(cfg.Pay.TLS.CertPath, "")
if err != nil {
return nil, err
}
dialOpts = append(dialOpts,
grpc.WithTransportCredentials(creds),
grpc.WithPerRPCCredentials(dialer.NewCredentials(cfg.Pay.AuthKey, true)))
} else {
dialOpts = append(dialOpts,
grpc.WithInsecure(),
grpc.WithPerRPCCredentials(dialer.NewCredentials(cfg.Pay.AuthKey, false)))
}
var url string
if cfg.Pay.Address == "" {
url = defaultSignerURL
} else {
url = cfg.Pay.Address + ":" + cfg.Pay.Port
}
conn, err := grpc.Dial(url, dialOpts...)
if err != nil {
return nil, err
}
return &SignerClient{
conn: conn,
SignerClient: pb.NewSignerClient(conn),
}, nil
}
// Close shuts down the client's gRPC connection
func (s *SignerClient) Close() { s.conn.Close() }
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/grpc-clients/doc.go | grpc-clients/doc.go | // Package clients provides GRPC client constructors for various RTrade services
// that Temporal relies on.
package clients
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/mail/mail_test.go | mail/mail_test.go | package mail_test
import (
"fmt"
"os"
"testing"
"github.com/RTradeLtd/Temporal/mail"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2"
)
var (
testRecipientEmail1 = "postables+test1@rtradetechnologies.com"
testRecipientEmail2 = "postables+test2@rtradetechnologies.com"
testRecipientName1 = "postables1"
testRecipientName2 = "postables2"
testCfgPath = "../testenv/config.json"
)
func TestMail(t *testing.T) {
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
dbm, err := database.New(cfg, database.Options{SSLModeDisable: true})
if err != nil {
t.Fatal(err)
}
if cfg.Sendgrid.APIKey == "" {
cfg.Sendgrid.APIKey = os.Getenv("SENDGRID_API_KEY")
cfg.Sendgrid.EmailAddress = "temporal@rtradetechnologies.com"
cfg.Sendgrid.EmailName = "Temporal TravisCI Test"
}
mm, err := mail.NewManager(cfg, dbm.DB)
if err != nil {
t.Fatal(err)
}
content := fmt.Sprint("<br>WowSuchEmail<br>WowSuchFormat")
if _, err = mm.SendEmail(
"testEmail",
content,
"",
testRecipientName1,
testRecipientEmail1,
); err != nil {
t.Fatal(err)
}
if _, err = mm.SendEmail(
"testEmail",
content,
"text/html",
testRecipientName1,
testRecipientEmail1,
); err != nil {
t.Fatal(err)
}
if err = mm.BulkSend(
"testEmail",
content,
"text/html",
[]string{testRecipientName1, testRecipientName2},
[]string{testRecipientEmail1, testRecipientEmail2},
); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/mail/mail.go | mail/mail.go | package mail
import (
"errors"
"sync"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
"github.com/jinzhu/gorm"
"github.com/sendgrid/rest"
sendgrid "github.com/sendgrid/sendgrid-go"
"github.com/sendgrid/sendgrid-go/helpers/mail"
)
// Mailer is a class that handles mail delivery
type Mailer interface {
Send(email *mail.SGMailV3) (*rest.Response, error)
}
// Manager is our manager that handles email sending
type Manager struct {
APIKey string `json:"api_key"`
EmailAddress string `json:"email_address"` // EmailAddress is the address from which messages will be sent from
EmailName string `json:"email_name"` // EmailName is the name of the email address
userManager *models.UserManager
client Mailer
cmux sync.Mutex
}
// NewManager is used to create our mail manager, allowing us to send email
func NewManager(tCfg *config.TemporalConfig, db *gorm.DB) (*Manager, error) {
var (
apiKey = tCfg.Sendgrid.APIKey
emailAddress = tCfg.Sendgrid.EmailAddress
emailName = tCfg.Sendgrid.EmailName
client = sendgrid.NewSendClient(apiKey)
um = models.NewUserManager(db)
)
return &Manager{
APIKey: apiKey,
EmailAddress: emailAddress,
EmailName: emailName,
client: client,
userManager: um,
}, nil
}
// BulkSend is used to handle sending a single email, to multiple recipients
func (mm *Manager) BulkSend(subject, content, contentType string, recipientNames, recipientEmails []string) error {
if len(recipientNames) != len(recipientEmails) {
return errors.New("recipientNames and recipientEmails must be fo equal length")
}
for k, v := range recipientEmails {
if _, err := mm.SendEmail(subject, content, contentType, recipientNames[k], v); err != nil {
return err
}
}
return nil
}
// SendEmail is used to send an email to temporal users
func (mm *Manager) SendEmail(subject, content, contentType, recipientName, recipientEmail string) (int, error) {
mm.cmux.Lock()
if contentType == "" {
contentType = "text/html"
}
var (
from = mail.NewEmail(mm.EmailName, mm.EmailAddress)
to = mail.NewEmail(recipientName, recipientEmail)
message = mail.NewContent(contentType, content)
)
response, err := mm.client.Send(mail.NewV3MailInit(from, subject, to, message))
mm.cmux.Unlock()
if err != nil {
return -1, err
}
return response.StatusCode, nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/mail/doc.go | mail/doc.go | // Package mail provides Temporal's email utilities
package mail
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/random_test.go | utils/random_test.go | package utils_test
import (
"testing"
"github.com/RTradeLtd/Temporal/utils"
)
const (
letterBytesLower = "abcdefghijklmnopqrstuvwxyz"
letterBytesLowerUpper = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
letterBytesMixed = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPRQRSTUVWXYZ"
)
func TestRandomUtils(t *testing.T) {
ru := utils.GenerateRandomUtils()
oldSeed := ru.Seed
ru.ReSeed()
newSeed := ru.Seed
if oldSeed == newSeed {
t.Fatal("failed to generate new seed")
}
random1 := ru.GenerateString(5, letterBytesLower)
if len(random1) != 5 {
t.Fatal("failed to contruct random string of valid length")
}
random2 := ru.GenerateString(5, letterBytesLowerUpper)
if len(random2) != 5 {
t.Fatal("failed to construct random string of valid length")
}
random3 := ru.GenerateString(5, letterBytesMixed)
if len(random3) != 5 {
t.Fatal("failed to construct random string of valid length")
}
if random1 == random2 {
t.Fatal("generated two random strings that were the same")
}
if random2 == random3 {
t.Fatal("generated two random strings that were the same")
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/time.go | utils/time.go | package utils
import "time"
// CalculateGarbageCollectDate is used to calculate the date at which data is removed from our system
func CalculateGarbageCollectDate(holdTimeInMonths int) time.Time {
return time.Now().AddDate(0, holdTimeInMonths, 0)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/time_test.go | utils/time_test.go | package utils_test
import (
"testing"
"time"
"github.com/RTradeLtd/Temporal/utils"
)
func TestCalculateGarbageCollectDate(t *testing.T) {
esimatedTime := utils.CalculateGarbageCollectDate(5)
if esimatedTime == time.Now() {
t.Fatal("invalid time retrieved")
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/cmc.go | utils/cmc.go | package utils
import (
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"sync"
"time"
)
var (
tickerURL = "https://pro-api.coinmarketcap.com/v1/cryptocurrency/quotes/latest"
pricer *priceChecker
)
type coinPrice struct {
price float64
nextRefresh time.Time
}
type priceChecker struct {
coins map[string]coinPrice
mux *sync.RWMutex
}
// USD contains USD prices for a cryptocurrency
type USD struct {
Price float64 `json:"price"`
Volume24H float64 `json:"volume_24h"`
PercentChange1H float64 `json:"percent_change_1h"`
PercentChange24H float64 `json:"percent_change_24h"`
PercentChange7D float64 `json:"percent_change_7d"`
MarketCap float64 `json:"market_cap"`
LastUpdated time.Time `json:"last_updated"`
}
func init() {
pricer = &priceChecker{
coins: make(map[string]coinPrice),
mux: &sync.RWMutex{},
}
}
// RetrieveUsdPrice is used to retrieve the USD price for a coin from CMC.
//
// Whenever we have a "fresh" coin price that is newer than 10 minutes
// we will return that price instead of querying coinmarketcap. In the event
// of a "stale" value we will hit the coinmarketcap api. If that errors
// then we return both the error, and whatever price we have in-memory
func RetrieveUsdPrice(coin, apiKey string) (float64, error) {
pricer.mux.RLock()
if pricer.coins[coin].price != 0 {
if time.Now().After(pricer.coins[coin].nextRefresh) {
goto REFRESH
}
cost := pricer.coins[coin].price
pricer.mux.RUnlock()
return cost, nil
}
REFRESH:
pricer.mux.RUnlock()
pricer.mux.Lock()
defer pricer.mux.Unlock()
if pricer.coins[coin].price != 0 && !time.Now().After(pricer.coins[coin].nextRefresh) {
return pricer.coins[coin].price, nil
}
req, err := http.NewRequest("GET", tickerURL, nil)
if err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
req.Header.Add("X-CMC_PRO_API_KEY", apiKey)
q := url.Values{}
q.Add("slug", coin)
req.URL.RawQuery = q.Encode()
client := &http.Client{}
response, err := client.Do(req)
if err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
body, err := ioutil.ReadAll(response.Body)
if err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
var decode map[string]map[string]interface{}
if err = json.Unmarshal(body, &decode); err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
// we're only interested in the "data" field
data := decode["data"]
var (
datamap, quotemap, usdmap map[string]interface{}
usd USD
parsed bool
)
for k := range data {
out := data[k]
b, err := json.Marshal(out)
if err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
if err := json.Unmarshal(b, &datamap); err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
b, err = json.Marshal(datamap)
if err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
if err := json.Unmarshal(b, "emap); err != nil {
return pricer.coins[coin].price, err
}
if quotemap["quote"] != nil {
b, err = json.Marshal(quotemap["quote"])
if err != nil {
return pricer.coins[coin].price, err
}
if err := json.Unmarshal(b, &usdmap); err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
b, err = json.Marshal(usdmap["USD"])
if err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
if err := json.Unmarshal(b, &usd); err != nil {
fmt.Println("error: ", err)
return pricer.coins[coin].price, err
}
if usd.Price != 0 {
parsed = true
pricer.coins[coin] = coinPrice{
price: usd.Price,
nextRefresh: time.Now().Add(time.Minute * 10),
}
}
}
}
if !parsed {
return pricer.coins[coin].price, errors.New("failed to get price")
}
return pricer.coins[coin].price, nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/multiaddr_validator.go | utils/multiaddr_validator.go | package utils
import (
au "github.com/ipfs/go-ipfs-addr"
ma "github.com/multiformats/go-multiaddr"
)
/*
Utilities that allow the user to validate multiaddr formatted addresses
*/
// GenerateMultiAddrFromString is used to take a string, and convert it to a multiformat based address
func GenerateMultiAddrFromString(addr string) (ma.Multiaddr, error) {
var maddr ma.Multiaddr
maddr, err := ma.NewMultiaddr(addr)
if err != nil {
return nil, err
}
return maddr, nil
}
// ParseMultiAddrForIPFSPeer is used to parse a multiaddress to determine whether its a valid ipfs address
func ParseMultiAddrForIPFSPeer(address ma.Multiaddr) (bool, error) {
protocols := address.Protocols()
for _, v := range protocols {
if v.Name == "ipfs" || v.Name == "p2p" {
return true, nil
}
}
return false, nil
}
// ParsePeerIDFromIPFSMultiAddr is used to parse a multiaddress and extract the IPFS peer id
func ParsePeerIDFromIPFSMultiAddr(address ma.Multiaddr) (string, error) {
parsed, err := au.ParseMultiaddr(address)
if err != nil {
return "", err
}
pretty := parsed.ID().Pretty()
return pretty, nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/utils.go | utils/utils.go | package utils
import (
"math/big"
"github.com/RTradeLtd/database/v2/models"
"github.com/RTradeLtd/rtfs/v2"
"github.com/c2h5oh/datasize"
)
// CalculatePinCost is used to calculate the cost of pining a particular content hash
// it returns the cost to bill the user, as well as the calculated size of the pin
func CalculatePinCost(username, contentHash string, holdTimeInMonths int64, im rtfs.Manager, um *models.UsageManager) (float64, int64, error) {
// get total size of content hash in bytes ensuring that we calculate size
// by following unique references
sizeInBytes, _, err := rtfs.DedupAndCalculatePinSize(contentHash, im)
if err != nil {
return 0, 0, err
}
// if this is true, fall back to default calculation
// as it wont always be possible to calculate deduplicated
// storage costs if the object is not of a unixfs type
if sizeInBytes <= 0 {
stats, err := im.Stat(contentHash)
if err != nil {
return 0, 0, err
}
sizeInBytes = int64(stats.CumulativeSize)
}
// get gigabytes convert to bytes
gigaInBytes := datasize.GB.Bytes()
// convert size of content hash form int to float64
sizeInBytesFloat := float64(sizeInBytes)
// convert gigabytes to float
gigabytesFloat := float64(gigaInBytes)
// convert object size from bytes to gigabytes
objectSizeInGigabytesFloat := sizeInBytesFloat / gigabytesFloat
// get the users usage model
usage, err := um.FindByUserName(username)
if err != nil {
return 0, 0, err
}
// if they are free tier, they don't incur data charges
if usage.Tier == models.Free || usage.Tier == models.WhiteLabeled || usage.Tier == models.Unverified {
return 0, sizeInBytes, nil
}
// dynamic pricing based on their usage tier
costPerMonthFloat := objectSizeInGigabytesFloat * usage.Tier.PricePerGB()
return costPerMonthFloat * float64(holdTimeInMonths), sizeInBytes, nil
}
// CalculateFileCost is used to calculate the cost of storing a file
func CalculateFileCost(username string, holdTimeInMonths, size int64, um *models.UsageManager) (float64, error) {
gigabytesFloat := float64(datasize.GB.Bytes())
sizeFloat := float64(size)
sizeGigabytesFloat := sizeFloat / gigabytesFloat
// get the users usage model
usage, err := um.FindByUserName(username)
if err != nil {
return 0, err
}
// if they are free tier, they don't incur data charges
if usage.Tier == models.Free || usage.Tier == models.WhiteLabeled || usage.Tier == models.Unverified {
return 0, nil
}
// dynamic pricing based on their usage tier
costPerMonthFloat := sizeGigabytesFloat * usage.Tier.PricePerGB()
return costPerMonthFloat * float64(holdTimeInMonths), nil
}
// FloatToBigInt used to convert a float to big int
func FloatToBigInt(val float64) *big.Int {
bigval := new(big.Float)
bigval.SetFloat64(val)
// Set precision if required.
// bigval.SetPrec(64)
coin := new(big.Float)
coin.SetInt(big.NewInt(1000000000000000000))
bigval.Mul(bigval, coin)
result := new(big.Int)
bigval.Int(result) // store converted number in result
return result
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/cmc_test.go | utils/cmc_test.go | package utils_test
import (
"os"
"testing"
"github.com/RTradeLtd/Temporal/utils"
)
func TestRetrieveUsdPrice(t *testing.T) {
type args struct {
coin string
}
tests := []struct {
name string
args args
wantErr bool
}{
{"Ethereum", args{"ethereum"}, false},
{"Monero", args{"monero"}, false},
{"Bitcoin", args{"bitcoin"}, false},
{"Litecoin", args{"litecoin"}, false},
{"NotARealCoin", args{"NotARealCoin"}, true},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
price, err := utils.RetrieveUsdPrice(tt.args.coin, os.Getenv("CMC_API"))
if (err != nil) != tt.wantErr {
t.Error(err)
}
if price == 0 && tt.args.coin != "NotARealCoin" {
t.Error("price is 0, unexpected result")
}
price, err = utils.RetrieveUsdPrice(tt.args.coin, os.Getenv("CMC_API"))
if (err != nil) != tt.wantErr {
t.Error(err)
}
if price == 0 && tt.args.coin != "NotARealCoin" {
t.Error("price is 0, unexpected result")
}
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/utils_test.go | utils/utils_test.go | package utils_test
import (
"testing"
"time"
"github.com/RTradeLtd/Temporal/utils"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2"
"github.com/RTradeLtd/database/v2/models"
"github.com/RTradeLtd/rtfs/v2"
"github.com/jinzhu/gorm"
)
const (
testHash = "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"
nodeOneAPIAddr = "127.0.0.1:5001"
testSize = int64(132520817)
)
func TestUtils_CalculatePinCost(t *testing.T) {
manager, err := rtfs.NewManager(nodeOneAPIAddr, "", time.Minute*60)
if err != nil {
t.Fatal(err)
}
cfg, err := config.LoadConfig("../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
usage := models.NewUsageManager(db)
type args struct {
username string
hash string
months int64
}
tests := []struct {
name string
args args
wantErr bool
}{
{"Pass", args{"testuser", testHash, int64(10)}, false},
{"Fail", args{"thisusertotallydoesnotexist", testHash, int64(10)}, true},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if _, _, err := utils.CalculatePinCost(
tt.args.username,
tt.args.hash,
tt.args.months,
manager,
usage,
); (err != nil) != tt.wantErr {
t.Fatalf("CalculatePinCost err = %v, wantErr %v", err, tt.wantErr)
}
})
}
}
func TestUtils_CalculateFileCost(t *testing.T) {
cfg, err := config.LoadConfig("../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
usage := models.NewUsageManager(db)
type args struct {
username string
size int64
months int64
}
tests := []struct {
name string
args args
wantErr bool
}{
{"Pass", args{"testuser", testSize, int64(10)}, false},
{"Fail", args{"totallydoesnotexist", testSize, int64(10)}, true},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if _, err := utils.CalculateFileCost(
tt.args.username,
tt.args.months,
tt.args.size,
usage,
); (err != nil) != tt.wantErr {
t.Fatalf("CalculateFileCost err = %v, wantErr %v", err, tt.wantErr)
}
})
}
}
func TestUtils_FloatToBigInt(t *testing.T) {
want := int64(500000000000000000)
bigInt := utils.FloatToBigInt(0.5)
if bigInt.Int64() != want {
t.Fatal("failed to properly calculate big int")
}
}
func loadDatabase(cfg *config.TemporalConfig) (*gorm.DB, error) {
dbm, err := database.New(cfg, database.Options{SSLModeDisable: true})
if err != nil {
return nil, err
}
return dbm.DB, nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/ma_test.go | utils/ma_test.go | package utils_test
import (
"testing"
"github.com/RTradeLtd/Temporal/utils"
)
var testIpfsMultiAddrString = "/ip4/192.168.1.242/tcp/4001/ipfs/QmXivHtDyAe8nS7cbQiS7ri9haUM2wGvbinjKws3a4EstT"
var testP2PMultiAddrString = "/ip4/192.168.1.242/tcp/4001/p2p/QmXivHtDyAe8nS7cbQiS7ri9haUM2wGvbinjKws3a4EstT"
var testInvalidIpfsMultiAddr = "/onion/erhkddypoy6qml6h:4003"
var testPeerID = "QmXivHtDyAe8nS7cbQiS7ri9haUM2wGvbinjKws3a4EstT"
func TestMultiAddrValidator(t *testing.T) {
if _, err := utils.GenerateMultiAddrFromString("notarealmultiaddr"); err == nil {
t.Fatal("error expected")
}
addr, err := utils.GenerateMultiAddrFromString(testInvalidIpfsMultiAddr)
if err != nil {
t.Fatal(err)
}
if valid, err := utils.ParseMultiAddrForIPFSPeer(addr); err != nil {
t.Fatal(err)
} else if valid {
t.Fatal("address should not be a valid ipfs address")
}
addr, err = utils.GenerateMultiAddrFromString(testIpfsMultiAddrString)
if err != nil {
t.Fatal(err)
}
if addr == nil {
t.Fatal("addr is nil when it shouldn't be")
}
if valid, err := utils.ParseMultiAddrForIPFSPeer(addr); err != nil {
t.Fatal(err)
} else if !valid {
t.Fatal("address should be a valid ipfs address")
}
peerID, err := utils.ParsePeerIDFromIPFSMultiAddr(addr)
if err != nil {
t.Fatal(err)
}
if peerID != testPeerID {
t.Fatal("recovered peer id does not match")
}
addr, err = utils.GenerateMultiAddrFromString(testP2PMultiAddrString)
if err != nil {
t.Fatal(err)
}
peerID, err = utils.ParsePeerIDFromIPFSMultiAddr(addr)
if err != nil {
t.Fatal(err)
}
if peerID != testPeerID {
t.Fatal("recovered peer id does not match")
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/doc.go | utils/doc.go | // Package utils provides miscellaneous helpers and utilities
package utils
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/utils/random.go | utils/random.go | package utils
import (
"math/rand"
"time"
)
/*
collection of random generating functions
Taken from https://www.calhoun.io/creating-random-strings-in-go/
*/
const (
// LetterBytes are the letters of an alphabet used to generate a random number
LetterBytes = "abcdefghijklmnopqrstuvwxyz"
)
// RandomUtils is our helper struct for random related utilities
type RandomUtils struct {
Seed *rand.Rand
}
// GenerateRandomUtils is used to generate our random utils struct
func GenerateRandomUtils() *RandomUtils {
seed := generateSeed()
return &RandomUtils{Seed: seed}
}
// generateSeed is used to generate a random seed
func generateSeed() *rand.Rand {
return rand.New(rand.NewSource(time.Now().UnixNano()))
}
// ReSeed is used to reseed our RNG
func (u *RandomUtils) ReSeed() {
preSeed := u.Seed.Int63()
u.Seed = rand.New(rand.NewSource(time.Now().UnixNano() + ((preSeed / 3) % 2)))
}
// GenerateString is used to generate a fixed length random string
// from the specified charset, using a fresh seed each time
func (u *RandomUtils) GenerateString(length int, charset string) string {
u.ReSeed()
b := make([]byte, length)
for i := range b {
b[i] = charset[u.Seed.Intn(len(charset))]
}
return string(b)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/middleware/cors.go | api/middleware/cors.go | package middleware
import (
"github.com/gin-gonic/gin"
rscors "github.com/rs/cors/wrapper/gin"
)
var (
// DefaultAllowedOrigins are the default allowed origins for the api, allowing for access
// via both of our internet uplinks when using the web interface.
DefaultAllowedOrigins = []string{"https://temporal.cloud", "https://backup.temporal.cloud"}
)
// CORSMiddleware is used to load our CORS handling logic
func CORSMiddleware(devMode bool, debug bool, allowedOrigins []string) gin.HandlerFunc {
opts := rscors.Options{}
if devMode {
opts.AllowedOrigins = []string{"*"}
opts.AllowCredentials = true
} else {
opts.AllowedOrigins = allowedOrigins
}
opts.AllowedMethods = []string{"GET", "POST", "OPTIONS", "DELETE", "PUT", "HEAD"}
opts.AllowedHeaders = []string{
"cache-control",
"Authorization",
"X-Request-ID",
"Origin",
"Accept",
"Content-Type",
"X-Requested-With",
"user-agent",
}
if debug {
opts.Debug = true
}
return rscors.New(opts)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/middleware/middleware_test.go | api/middleware/middleware_test.go | package middleware
import (
"net/http"
"net/http/httptest"
"reflect"
"testing"
"go.uber.org/zap/zaptest"
"github.com/gin-gonic/gin"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2"
)
func TestRequestIDMiddleware(t *testing.T) {
testRecorder := httptest.NewRecorder()
_, engine := gin.CreateTestContext(testRecorder)
engine.Use(RequestID())
req, err := http.NewRequest("GET", "/foo", nil)
if err != nil {
t.Fatal(err)
}
engine.GET("/foo", func(c *gin.Context) {
c.String(200, "hello")
})
engine.ServeHTTP(testRecorder, req)
if testRecorder.Result().Header.Get("X-Request-ID") == "" {
t.Fatal("failed to set a request header")
}
}
func TestJwtMiddleware(t *testing.T) {
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
jwt := JwtConfigGenerate(cfg.JWT.Key, cfg.JWT.Realm, db.DB, logger)
if reflect.TypeOf(jwt).String() != "*jwt.GinJWTMiddleware" {
t.Fatal("failed to reflect correct middleware type")
}
if jwt.Realm != cfg.JWT.Realm {
t.Fatal("failed to set correct realm name")
}
testRecorder := httptest.NewRecorder()
testCtx, _ := gin.CreateTestContext(testRecorder)
if token, valid := jwt.Authenticator("testuser", "admin", testCtx); !valid {
t.Fatal("failed to authenticate user")
} else if token != "testuser" {
t.Fatal("failed to authenticate")
}
// test a failed auth
if _, valid := jwt.Authenticator("testuser22", "admin22", testCtx); valid {
t.Fatal("user authenticated when auth should've failed")
}
if valid := jwt.Authorizator("testuser", testCtx); !valid {
t.Fatal("failed to authorize user")
}
if valid := jwt.Authorizator("testuser2", testCtx); valid {
t.Fatal("failed to authorize user")
}
jwt.Unauthorized(testCtx, 401, "unauthorized access")
if testRecorder.Code != 401 {
t.Fatal("failed to validate http status code")
}
}
func TestCORSMiddleware(t *testing.T) {
cors := CORSMiddleware(true, true, DefaultAllowedOrigins)
if reflect.TypeOf(cors).String() != "gin.HandlerFunc" {
t.Fatal("failed to reflect correct middleware type")
}
cors = CORSMiddleware(false, true, DefaultAllowedOrigins)
if reflect.TypeOf(cors).String() != "gin.HandlerFunc" {
t.Fatal("failed to reflect correct middleware type")
}
cors = CORSMiddleware(false, true, []string{})
if reflect.TypeOf(cors).String() != "gin.HandlerFunc" {
t.Fatal("failed to reflect correct middleware type")
}
}
func TestSecMiddleware(t *testing.T) {
sec := NewSecWare(false)
if reflect.TypeOf(sec).String() != "gin.HandlerFunc" {
t.Fatal("failed to reflect correct middleware type")
}
sec = NewSecWare(true)
if reflect.TypeOf(sec).String() != "gin.HandlerFunc" {
t.Fatal("failed to reflect correct middleware type")
}
}
func loadDatabase(cfg *config.TemporalConfig) (*database.Manager, error) {
return database.New(cfg, database.Options{
SSLModeDisable: true,
})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/middleware/jwt.go | api/middleware/jwt.go | package middleware
import (
"time"
"github.com/RTradeLtd/database/v2/models"
jwt "github.com/appleboy/gin-jwt"
"github.com/gin-gonic/gin"
"github.com/jinzhu/gorm"
"go.uber.org/zap"
)
// Login is used to unmarshal a login in request so that we can parse it
type Login struct {
Username string `form:"username" json:"username" binding:"required"`
Password string `form:"password" json:"password" binding:"required"`
}
// JwtConfigGenerate is used to generate our JWT configuration
func JwtConfigGenerate(jwtKey, realmName string, db *gorm.DB, l *zap.SugaredLogger) *jwt.GinJWTMiddleware {
l = l.Named("jwt-middleware")
authMiddleware := &jwt.GinJWTMiddleware{
Realm: realmName,
Key: []byte(jwtKey),
Timeout: time.Hour * 24,
MaxRefresh: time.Hour * 24,
// userId will be either the username or email address
Authenticator: func(userId string, password string, c *gin.Context) (string, bool) {
lAuth := l.With("user", userId)
userManager := models.NewUserManager(db)
validLogin, err := userManager.SignIn(userId, password)
if err != nil {
lAuth.Warn("bad sign in", "error", err)
return userId, false
}
if !validLogin {
lAuth.Warn("bad login")
return userId, false
}
// fixes https://github.com/RTradeLtd/Temporal/issues/405
// regardless of whether or not they are providing username or email
// always return the username
usr, err := userManager.FindByUserName(userId)
if err != nil {
usr, err = userManager.FindByEmail(userId)
if err != nil {
lAuth.Warn("failed to find user", "error", err)
return "", false
}
}
// email enabled implies they have verified their email
if !usr.EmailEnabled {
return "", false
}
lAuth.Info("successful login", "username", usr.UserName)
return usr.UserName, true
},
Authorizator: func(userId string, c *gin.Context) bool {
// as a final security step, ensure that we can find the user in our database
userManager := models.NewUserManager(db)
usr, err := userManager.FindByUserName(userId)
if err != nil {
return false
}
return usr.EmailEnabled && usr.AccountEnabled
},
Unauthorized: func(c *gin.Context, code int, message string) {
l.Error("invalid login detected")
c.JSON(code, gin.H{
"code": code,
"message": message,
})
},
TokenLookup: "header:Authorization",
TokenHeadName: "Bearer",
TimeFunc: time.Now,
}
return authMiddleware
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/middleware/requestid.go | api/middleware/requestid.go | package middleware
import (
"github.com/gin-gonic/gin"
"github.com/google/uuid"
)
// RequestID is used to insert a randomly generated
// uuid as a value to a X-Request-ID header
func RequestID() gin.HandlerFunc {
return func(c *gin.Context) {
c.Header("X-Request-Id", uuid.New().String())
c.Next()
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/middleware/security.go | api/middleware/security.go | package middleware
import (
"github.com/gin-contrib/secure"
"github.com/gin-gonic/gin"
)
// NewSecWare is used to initialize our security middleware
func NewSecWare(devMode bool) gin.HandlerFunc {
config := secure.DefaultConfig()
config.IsDevelopment = devMode
config.ContentSecurityPolicy = "default-src 'self' https://checkout.stripe.com; connect-src https://checkout.stripe.com; frame-src https://checkout.stripe.com; script-src https://checkout.stripe.com; img-src https://*.stripe.com; object-src 'none'"
return secure.New(config)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/middleware/doc.go | api/middleware/doc.go | // Package middleware provides the middleware used by Temporal's APIs
package middleware
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_organizations_test.go | api/v2/routes_organizations_test.go | package v2
import (
"fmt"
"io/ioutil"
"net/http"
"net/http/httptest"
"net/url"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
)
func Test_API_Routes_Organization(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// upgrade account to partner for test.
if err := api.usage.UpdateTier("testuser", models.Partner); err != nil {
t.Fatal(err)
}
// create organization
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest("POST", "/v2/org/new", nil)
req.Header.Add("Authorization", authHeader)
urlValues := url.Values{}
urlValues.Add("name", "testorg")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Result().StatusCode != http.StatusOK {
t.Fatal("bad status returned")
}
// find the organization model to ensure it is create
org, err := models.NewOrgManager(db).FindByName("testorg")
if err != nil {
t.Fatal(err)
}
defer db.Unscoped().Delete(org)
// register organization user
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("POST", "/v2/org/register/user", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("username", "testorg-user")
urlValues.Add("password", "password123")
urlValues.Add("email_address", "testorg+22@example.org")
urlValues.Add("organization_name", "testorg")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Result().StatusCode != http.StatusOK {
t.Fatal("bad status returned")
}
usr, err := models.NewUserManager(db).FindByUserName("testorg-user")
if err != nil {
t.Fatal(err)
}
defer db.Unscoped().Delete(usr)
if usr.Organization != "testorg" {
t.Fatal("bad organization found")
}
usg, err := models.NewUsageManager(db).FindByUserName("testorg-user")
if err != nil {
t.Fatal(err)
}
defer db.Unscoped().Delete(usg)
if usg.Tier != models.WhiteLabeled {
t.Fatal("bad tier found")
}
// search for the organization
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("GET", "/v2/org/get/model", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("name", "testorg")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Result().StatusCode != http.StatusOK {
t.Fatal("bad status returned")
}
// get a billing report
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("GET", "/v2/org/get/billing/report", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("name", "testorg")
urlValues.Add("number_of_days", "30")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Result().StatusCode != http.StatusOK {
t.Fatal("bad status returned")
}
// user upload tests
type args struct {
name string
user string
asCSV string
}
tests := []struct {
name string
args args
wantCode int
}{
{"NoCSV", args{"testorg", "testorg-user", "false"}, 200},
{"WithCSV", args{"testorg", "testorg-user", "false"}, 200},
{"No-OrgName", args{"", "testorg-user", "false"}, 400},
{"No-Users", args{"testorg", "", "false"}, 400},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("POST", "/v2/org/user/uploads", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
// set org name
urlValues.Add("name", tt.args.name)
// set users
urlValues.Add("user", tt.args.user)
// set as csv
urlValues.Add("as_csv", tt.args.asCSV)
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Result().StatusCode != tt.wantCode {
data, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
t.Error(err)
}
fmt.Printf("response:\t%s\t", string(data))
t.Fatal("bad status")
}
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_ipns.go | api/v2/routes_ipns.go | package v2
import (
"fmt"
"net/http"
"strconv"
"strings"
"time"
"github.com/gin-gonic/gin"
path "github.com/ipfs/go-path"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/Temporal/utils"
"github.com/RTradeLtd/database/v2/models"
gocid "github.com/ipfs/go-cid"
)
// PublishToIPNSDetails is used to publish a record on IPNS with more fine grained control over typical publishing methods
func (api *API) publishToIPNSDetails(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "hash", "life_time", "ttl", "key", "resolve")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate that the hash is an ipfs one
if _, err := gocid.Decode(forms["hash"]); err != nil {
Fail(c, err)
return
}
// ensure user owns the key
if ownsKey, err := api.um.CheckIfKeyOwnedByUser(username, forms["key"]); err != nil {
api.LogError(c, err, eh.KeySearchError)(http.StatusBadRequest)
return
} else if !ownsKey {
err = fmt.Errorf("unauthorized access to key by user %s", username)
api.LogError(c, err, eh.KeyUseError)(http.StatusBadRequest)
return
}
// parse resolve into boolean type
resolve, err := strconv.ParseBool(forms["resolve"])
if err != nil {
Fail(c, err)
return
}
// parse lifetime into time.Duration
lifetime, err := time.ParseDuration(forms["life_time"])
if err != nil {
Fail(c, err)
return
}
// parse ttl into time.Duration
ttl, err := time.ParseDuration(forms["ttl"])
if err != nil {
Fail(c, err)
return
}
if err := api.usage.CanPublishIPNS(username); err != nil {
api.LogError(c, err, "too many ipns records published this month, please wait until next billing cycle")(http.StatusBadRequest)
return
}
if err := api.usage.IncrementIPNSUsage(username, 1); err != nil {
api.LogError(c, err, "failed to increment ipns usage")
return
}
// create ipns entry creation message
ie := queue.IPNSEntry{
CID: forms["hash"],
LifeTime: lifetime,
TTL: ttl,
Resolve: resolve,
Key: forms["key"],
UserName: username,
NetworkName: "public",
}
// send message for processing
if err = api.queues.ipns.PublishMessage(ie); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// log and return
api.l.With("user", username).Info("ipns entry creation sent to backend")
Respond(c, http.StatusOK, gin.H{"response": "ipns entry creation sent to backend"})
}
// getIPNSRecordsPublishedByUser is used to fetch IPNS records published by a user
func (api *API) getIPNSRecordsPublishedByUser(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
if c.Query("paged") == "true" {
api.pageIt(c, api.upm.DB.Where("user_name = ?", username), &[]models.IPNS{})
return
}
// search for all records published by this user
records, err := api.im.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.IpnsRecordSearchError)(http.StatusBadRequest)
return
}
// if they haven't uploaded any records, don't fail just notify them
if records == nil || len(*records) == 0 {
Respond(c, http.StatusOK, gin.H{"response": "no ipns records found"})
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": records})
}
// PinIPNSHash is used to pin the content referenced by an IPNS record
// only usable by public IPFS.
// The processing logic is as follows:
// 1) parse the path which will be /ipns/hash
// 2) validate that it is a valid path
// 3) resolve the cid referenced by the record
// 4) pop the last segment of the path, which will be the hash we are looking to pin
func (api *API) pinIPNSHash(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "hold_time", "ipns_path")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate the provided path is legit
parsedPath := path.FromString(forms["ipns_path"])
if err := parsedPath.IsValid(); err != nil {
Fail(c, err, http.StatusBadRequest)
return
}
// parse hold time
holdTimeInt, err := api.validateHoldTime(username, forms["hold_time"])
if err != nil {
Fail(c, err)
return
}
// resolve the ipns path to get the hash
hashToPin, err := api.ipfs.Resolve(forms["ipns_path"])
if err != nil {
api.LogError(c, err, eh.IpnsRecordSearchError)(http.StatusBadRequest)
return
}
// extract the hash to pin by using the cid at the very end of the path
// if someone is passing in a multi-cid path like /ipfs/cidA/cidB/cidC
// IPFS will pin cidC, although most of our service will recognize this as a valid hash
// IPFS Cluster doesn't, so to keep consistency with the rest of our endpoints
// we should only operate on a bare cidC
hash := strings.Split(hashToPin, "/")[len(strings.Split(hashToPin, "/"))-1]
upload, err := api.upm.FindUploadByHashAndUserAndNetwork(username, hash, "public")
// by this conditional if statement passing, it means the user has
// upload content matching this hash before, and we don't want to charge them
// so we should gracefully abort further processing
if err == nil || upload != nil {
Respond(c, http.StatusBadRequest, gin.H{"response": alreadyUploadedMessage})
return
}
// get the cost of this object
cost, size, err := utils.CalculatePinCost(username, hash, holdTimeInt, api.ipfs, api.usage)
if err != nil {
api.LogError(c, err, eh.CostCalculationError)(http.StatusBadRequest)
return
}
// ensure they have enough credits
if err := api.validateUserCredits(username, cost); err != nil {
api.LogError(c, err, eh.InvalidBalanceError)(http.StatusPaymentRequired)
return
}
if err := api.usage.UpdateDataUsage(username, uint64(size)); err != nil {
api.LogError(c, err, eh.CantUploadError)(http.StatusBadRequest)
api.refundUserCredits(username, "pin", cost)
return
}
// create pin message
qp := queue.IPFSClusterPin{
CID: hash,
NetworkName: "public",
UserName: username,
HoldTimeInMonths: holdTimeInt,
CreditCost: cost,
Size: int64(size),
}
// send message for processing
if err = api.queues.cluster.PublishMessage(qp); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
api.refundUserCredits(username, "pin", cost)
api.usage.ReduceDataUsage(username, uint64(size))
return
}
// log and return
api.l.Infow("ipfs pin request sent to backend", "user", username)
Respond(c, http.StatusOK, gin.H{"response": "pin request sent to backend"})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/rtfsp_management_test.go | api/v2/rtfsp_management_test.go | package v2
import (
"net/url"
"testing"
"github.com/RTradeLtd/database/v2/models"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
)
func Test_API_Routes_IPFS_Private_User_Management(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
if _, err := api.um.NewUserAccount("testaccount2323", "password123", "example@example.org"); err != nil {
t.Fatal(err)
}
if _, err := api.nm.CreateHostedPrivateNetwork(
"testnetworkdude",
"swarmkey",
nil,
models.NetworkAccessOptions{Owner: "testuser", Users: []string{"testuser"}},
); err != nil {
t.Fatal(err)
}
var apiResp = apiResponse{}
urlValues := url.Values{}
urlValues.Add("network_name", "testnetworkdude")
urlValues.Add("users", "testaccount2323")
urlValues.Add("owners", "testaccount2323")
// test adding a user
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/users/add", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// test removing a user
if err := sendRequest(
api, "DELETE", "/v2/ipfs/private/network/users/remove", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// test adding an owner
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/owners/add", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_rtfsp_management.go | api/v2/routes_rtfsp_management.go | package v2
import (
"errors"
"net/http"
"strings"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/database/v2/models"
nexus "github.com/RTradeLtd/grpc/nexus"
"github.com/gin-gonic/gin"
)
// these API calls are used to handle management of private IPFS networks
// CreateIPFSNetwork is used to create an entry in the database for a private ipfs network
func (api *API) createIPFSNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract network name
networkName, exists := c.GetPostForm("network_name")
if !exists {
FailWithMissingField(c, "network_name")
return
}
switch strings.ToLower(networkName) {
case "public", "etherswarm":
Fail(c, errors.New("networok name cant be public, PUBLIC, etherswarm, or ETHERSWARM"))
return
}
// retrieve parameters - thse are all optional
swarmKey, _ := c.GetPostForm("swarm_key")
bPeers, _ := c.GetPostFormArray("bootstrap_peers")
users := c.PostFormArray("users")
if users == nil {
users = []string{username}
} else {
users = append(users, username)
}
// create the network in our database
network, err := api.nm.CreateHostedPrivateNetwork(networkName, swarmKey, bPeers, models.NetworkAccessOptions{Users: users, Owner: username})
if err != nil {
api.LogError(c, err, eh.NetworkCreationError)(http.StatusBadRequest)
return
}
// request orchestrator to start up network and create it after registering it in the database
resp, err := api.orch.StartNetwork(c, &nexus.NetworkRequest{
Network: networkName,
})
if err != nil {
api.LogError(c, err, "failed to start private network",
"network_name", networkName,
)(http.StatusBadRequest)
return
}
logger := api.l.With("user", username, "network_name", networkName)
logger.Info("network creation request received")
logger.With("db_id", network.ID).Info("database entry created")
// update allows users who can access the network
if len(users) > 0 {
for _, v := range users {
if err := api.um.AddIPFSNetworkForUser(v, networkName); err != nil && err.Error() != "network already configured for user" {
api.LogError(c, err, eh.NetworkCreationError)(http.StatusBadRequest)
return
}
api.l.With("user", v).Info("network added to user)")
}
}
api.l.With("response", resp).Info("network node started")
// respond with network details
Respond(c, http.StatusOK, gin.H{
"response": gin.H{
"id": network.ID,
"peer_id": resp.GetPeerId(),
"network_name": networkName,
"swarm_key": resp.GetSwarmKey(),
"users": network.Users,
},
})
}
func (api *API) startIPFSPrivateNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get network name
networkName, exists := c.GetPostForm("network_name")
if !exists {
FailWithMissingField(c, "network_name")
return
}
logger := api.l.With("user", username, "network_name", networkName)
logger.Info("private ipfs network start requested")
if err := api.isNetworkOwner(networkName, username); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusUnauthorized)
return
}
if _, err := api.orch.StartNetwork(c, &nexus.NetworkRequest{
Network: networkName}); err != nil {
api.LogError(c, err, "failed to start network")(http.StatusBadRequest)
return
}
// log and return
logger.Info("network started")
Respond(c, http.StatusOK, gin.H{
"response": gin.H{
"network_name": networkName,
"state": "started",
},
})
}
func (api *API) stopIPFSPrivateNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get network name
networkName, exists := c.GetPostForm("network_name")
if !exists {
FailWithMissingField(c, "network_name")
return
}
logger := api.l.With("user", username, "network_name", networkName)
logger.Info("private ipfs network shutdown requested")
// verify admin access to network
if err := api.isNetworkOwner(networkName, username); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusUnauthorized)
return
}
// send a stop network request
if _, err := api.orch.StopNetwork(c, &nexus.NetworkRequest{
Network: networkName}); err != nil {
api.LogError(c, err, "failed to stop network")(http.StatusBadRequest)
return
}
// log and return
logger.Info("network stopped")
Respond(c, http.StatusOK, gin.H{
"response": gin.H{
"network_name": networkName,
"state": "stopped",
},
})
}
func (api *API) removeIPFSPrivateNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the network name
networkName, exists := c.GetPostForm("network_name")
if !exists {
FailWithMissingField(c, "network_name")
return
}
logger := api.l.With("user", username, "network_name", networkName)
logger.Info("private ipfs network shutdown requested")
// verify admin access to network
network, err := api.nm.GetNetworkByName(networkName)
if err != nil {
api.LogError(c, err, eh.NetworkSearchError)(http.StatusInternalServerError)
return
}
if err := api.isNetworkOwner(networkName, username); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusUnauthorized)
return
}
// send node removal request, removing all data stored
// this is a DESTRUCTIVE action
if _, err = api.orch.RemoveNetwork(c, &nexus.NetworkRequest{
Network: networkName}); err != nil {
api.LogError(c, err, "failed to remove network assets")(http.StatusBadRequest)
return
}
// remove network from database
if err = api.nm.Delete(networkName); err != nil {
api.LogError(c, err, "failed to remove network from database")(http.StatusBadRequest)
return
}
// remove network from users authorized networks
for _, v := range network.Users {
if err = api.um.RemoveIPFSNetworkForUser(v, networkName); err != nil {
api.LogError(c, err, "failed to remove network from users")(http.StatusBadRequest)
return
}
}
// log and return
logger.Info("network removed")
Respond(c, http.StatusOK, gin.H{
"response": gin.H{
"network_name": networkName,
"state": "removed",
},
})
}
// GetIPFSPrivateNetworkByName is used to private ipfs network information
func (api *API) getIPFSPrivateNetworkByName(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the network name
netName := c.Param("name")
// get all networks user has access to
networks, err := api.um.GetPrivateIPFSNetworksForUser(username)
if err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// ensure they can access this network
var found bool
for _, v := range networks {
if v == netName {
found = true
break
}
}
if !found {
Fail(c, errors.New(eh.PrivateNetworkAccessError))
return
}
logger := api.l.With("user", username, "network_name", netName)
logger.Info("private ipfs network by name requested")
// get network details from database
net, err := api.nm.GetNetworkByName(netName)
if err != nil {
api.LogError(c, err, eh.NetworkSearchError)(http.StatusBadRequest)
return
}
// retrieve additional stats if requested
// otherwise send generic information from the database directly
if c.Param("stats") == "true" {
logger.Info("retrieving additional stats from orchestrator")
stats, err := api.orch.NetworkStats(c, &nexus.NetworkRequest{Network: netName})
if err != nil {
api.LogError(c, err, eh.NetworkSearchError)(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": gin.H{
"database": net,
"network_stats": stats,
}})
} else {
// return
Respond(c, http.StatusOK, gin.H{"response": gin.H{
"database": net,
}})
}
}
// GetAuthorizedPrivateNetworks is used to retrieve authorized private networks
// an authorized private network is defined as a network a user has API access to
func (api *API) getAuthorizedPrivateNetworks(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get all networks the user has access too
networks, err := api.um.GetPrivateIPFSNetworksForUser(username)
if err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("authorized private ipfs network listing requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": networks})
}
// addUsersToNetwork is used to add a user to the list of authorized users
// for a given private network.
func (api *API) addUsersToNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
networkName, exists := c.GetPostForm("network_name")
if !exists {
FailWithMissingField(c, "network_name")
return
}
users, exists := c.GetPostFormArray("users")
if !exists {
FailWithMissingField(c, "users")
return
}
network, err := api.nm.GetNetworkByName(networkName)
if err != nil {
api.LogError(c, err, eh.NetworkSearchError)(http.StatusInternalServerError)
return
}
if err := api.isNetworkOwner(networkName, username); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusUnauthorized)
return
}
// make sure the user accounts exist
for _, user := range users {
if _, err := api.um.FindByUserName(user); err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusInternalServerError)
return
}
}
// combine both the currrent list of authorized users, and the list of users to add
network.Users = append(network.Users, users...)
// update the users field of the database model only
if err := api.nm.UpdateNetworkByName(networkName, map[string]interface{}{"users": network.Users}); err != nil {
api.LogError(c, err, "failed to update authorized users for network")
return
}
for _, user := range users {
if err := api.um.AddIPFSNetworkForUser(user, networkName); err != nil {
api.LogError(c, err, "failed to update network for user")(http.StatusInternalServerError)
return
}
}
Respond(c, http.StatusOK, gin.H{"response": "authorized user list updated"})
}
// removeUsersFromNetwork is used to remove a user from being able
// to access a network.
func (api *API) removeUsersFromNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
networkName, exists := c.GetPostForm("network_name")
if !exists {
FailWithMissingField(c, "network_name")
return
}
users, exists := c.GetPostFormArray("users")
if !exists {
FailWithMissingField(c, "users")
return
}
network, err := api.nm.GetNetworkByName(networkName)
if err != nil {
api.LogError(c, err, eh.NetworkSearchError)(http.StatusInternalServerError)
return
}
if err := api.isNetworkOwner(networkName, username); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusUnauthorized)
return
}
var (
usersToRemove = make(map[string]bool)
newUsers []string
)
for _, user := range users {
usersToRemove[user] = true
}
// iterate over all current users
// and compare against users to remove list
// if they aren't found, then we add them
// to the new users list.
for _, user := range network.Users {
if !usersToRemove[user] {
newUsers = append(newUsers, user)
}
}
if err := api.nm.UpdateNetworkByName(networkName, map[string]interface{}{"users": newUsers}); err != nil {
api.LogError(c, err, "failed to update authorized users for network")
return
}
for user := range usersToRemove {
if err := api.um.RemoveIPFSNetworkForUser(user, networkName); err != nil {
api.LogError(c, err, "failed to remove network from user")
return
}
}
Respond(c, http.StatusOK, gin.H{"response": "authorized user list updated"})
}
func (api *API) addOwnersToNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
networkName, exists := c.GetPostForm("network_name")
if !exists {
FailWithMissingField(c, "network_name")
return
}
owners, exists := c.GetPostFormArray("owners")
if !exists {
FailWithMissingField(c, "owners")
return
}
if err := api.isNetworkOwner(networkName, username); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusUnauthorized)
return
}
// make sure the user accounts exist
for _, owner := range owners {
if _, err := api.um.FindByUserName(owner); err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusInternalServerError)
return
}
}
network, err := api.nm.GetNetworkByName(networkName)
if err != nil { // remove network from users authorized networks
api.LogError(c, err, eh.NetworkSearchError)(http.StatusInternalServerError)
return
}
network.Owners = append(network.Owners, owners...)
if err := api.nm.UpdateNetworkByName(networkName, map[string]interface{}{"owners": network.Owners}); err != nil {
api.LogError(c, err, "failed to update network owners")
return
}
Respond(c, http.StatusOK, gin.H{"response": "network owners updated"})
}
func (api *API) isNetworkOwner(network, username string) error {
n, err := api.nm.GetNetworkByName(network)
if err != nil {
return err
}
for _, owner := range n.Owners {
if owner == username {
return nil
}
}
return errors.New("user is not owner")
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_payment_test.go | api/v2/routes_payment_test.go | package v2
import (
"net/http/httptest"
"net/url"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
)
func Test_API_Routes_Payments(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// test basic dash payment
// /v2/payments/create/dash
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest("POST", "/v2/payments/dash/create", nil)
req.Header.Add("Authorization", authHeader)
urlValues := url.Values{}
urlValues.Add("credit_value", "10")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
// test request signed payment message - rtc
// /v2/payments/request
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("POST", "/v2/payments/eth/request", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("payment_type", "rtc")
urlValues.Add("sender_address", "0x0")
urlValues.Add("credit_value", "10")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
// test request signed payment message - eth
// /v2/payments/request
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("POST", "/v2/payments/eth/request", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("payment_type", "eth")
urlValues.Add("sender_address", "0x0")
urlValues.Add("credit_value", "10")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
// test payment confirmation
// /v2/payments/confirm
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("POST", "/v2/payments/eth/confirm", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("payment_number", "10")
urlValues.Add("tx_hash", "0x1")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
// test bch create
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("POST", "/v2/payments/bch/create", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("credit_value", "10")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
// test bch confirm
testRecorder = httptest.NewRecorder()
req = httptest.NewRequest("POST", "/v2/payments/bch/confirm", nil)
req.Header.Add("Authorization", authHeader)
urlValues = url.Values{}
urlValues.Add("payment_number", "10")
urlValues.Add("tx_hash", "0x1")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_frontend.go | api/v2/routes_frontend.go | package v2
import (
"net/http"
"strconv"
"github.com/jinzhu/gorm"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/utils"
"github.com/RTradeLtd/database/v2/models"
"github.com/gin-gonic/gin"
gocid "github.com/ipfs/go-cid"
)
// CalculatePinCost is used to calculate the cost of pinning something to temporal
func (api *API) calculatePinCost(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// hash to calculate pin cost for
hash := c.Param("hash")
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
// months to store pin for
holdTime := c.Param("hold_time")
// parse hold time
holdTimeInt, err := strconv.ParseInt(holdTime, 10, 64)
if err != nil {
Fail(c, err)
return
}
// calculate pin cost
totalCost, _, err := utils.CalculatePinCost(username, hash, holdTimeInt, api.ipfs, api.usage)
if err != nil {
api.LogError(c, err, eh.CostCalculationError)(http.StatusBadRequest)
Fail(c, err)
return
}
// log and return
api.l.With("user", username).Info("pin cost calculation requested")
Respond(c, http.StatusOK, gin.H{"response": totalCost})
}
// CalculateFileCost is used to calculate the cost of uploading a file to our system
func (api *API) calculateFileCost(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// retrieve file to upload
file, err := c.FormFile("file")
if err != nil {
Fail(c, err)
return
}
// validate the file size is within limits
if err := api.FileSizeCheck(file.Size); err != nil {
Fail(c, err)
return
}
// how many months to store file for
forms, missingField := api.extractPostForms(c, "hold_time")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// parse hold time
holdTimeInt, err := strconv.ParseInt(forms["hold_time"], 10, 64)
if err != nil {
Fail(c, err)
return
}
api.l.With("user", username).Info("file cost calculation requested")
// calculate cost
cost, err := utils.CalculateFileCost(username, holdTimeInt, file.Size, api.usage)
if err != nil {
api.LogError(c, err, eh.CostCalculationError)(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": cost})
}
// GetEncryptedUploadsForUser is used to get all the encrypted uploads a user has
func (api *API) getEncryptedUploadsForUser(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
if c.Query("paged") == "true" {
api.pageIt(c, api.ue.DB.Where("user_name = ?", username), &[]models.EncryptedUpload{})
return
}
// find all uploads by this user
uploads, err := api.ue.FindUploadsByUser(username)
if err != nil && err != gorm.ErrRecordNotFound {
api.LogError(c, err, eh.UploadSearchError)(http.StatusBadRequest)
return
}
// if they haven't made any encrypted uploads, return a friendly message
if len(*uploads) == 0 {
Respond(c, http.StatusOK, gin.H{"response": "no encrypted uploads found, try them out :D"})
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": uploads})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/stats.go | api/v2/stats.go | package v2
import (
"net/http"
"github.com/RTradeLtd/Temporal/eh"
"github.com/gin-gonic/gin"
stats "github.com/semihalev/gin-stats"
)
func (api *API) getStats(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
if err := api.validateAdminRequest(username); err != nil {
FailNotAuthorized(c, eh.UnAuthorizedAdminAccess)
return
}
c.JSON(http.StatusOK, gin.H{
"version": api.version,
"response": stats.Report(),
})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_organizations.go | api/v2/routes_organizations.go | package v2
import (
"bytes"
"errors"
"html"
"net/http"
"strconv"
"strings"
"time"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/database/v2/models"
gpaginator "github.com/RTradeLtd/gpaginator"
"github.com/gin-gonic/gin"
"github.com/jszwec/csvutil"
)
// creates a new organization
func (api *API) newOrganization(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// first validate they are a partner
if org, err := api.usage.FindByUserName(username); err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
} else if org.Tier != models.Partner {
api.LogError(
c,
errors.New("account tier is not partner"),
"only partner accounts can create orgs",
)(http.StatusBadRequest)
return
}
// get the organization name
forms, missingField := api.extractPostForms(c, "name")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// create the organization
if _, err := api.orgs.NewOrganization(
forms["name"],
username,
); err != nil {
// creation failed, send an error message
api.LogError(
c,
err,
"failed to create organization",
)(http.StatusInternalServerError)
return
}
api.l.Infow("organization created",
"name", forms["name"], "owner", username)
Respond(c, http.StatusOK, gin.H{"response": "organization created"})
}
// getOrganization returns the organization model
// can only be called by organization owner
func (api *API) getOrganization(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the organization name
forms, missingField := api.extractPostForms(c, "name")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
org, ok := api.validateOrgOwner(c, forms["name"], username)
if !ok {
return
}
Respond(c, http.StatusOK, gin.H{"response": org})
}
func (api *API) getOrgBillingReport(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the organization name
forms, missingField := api.extractPostForms(c, "name", "number_of_days")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate number_of_days parameter
numDays, err := strconv.Atoi(forms["number_of_days"])
if err != nil {
api.LogError(
c,
err,
"number_of_days is not an int",
)(http.StatusBadRequest)
return
}
if _, ok := api.validateOrgOwner(c, forms["name"], username); !ok {
return
}
// generate a billing report
report, err := api.orgs.GenerateBillingReport(
forms["name"],
time.Now().AddDate(0, 0, -numDays),
time.Now(),
)
if err != nil {
api.LogError(
c,
err,
"failed to generate billing report",
)(http.StatusInternalServerError)
return
}
Respond(c, http.StatusOK, gin.H{"response": report})
}
// registerOrgUser is used to register an organization user
// unlike regular user registration, we dont check catch all
// email addresses
func (api *API) registerOrgUser(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(
c,
"username",
"password",
"email_address",
"organization_name",
)
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// prevent people from registering usernames that contain an `@` sign
// this prevents griefing by prevent user sign-ins by using a username
// that is based off an email address
if strings.ContainsRune(forms["username"], '@') {
Fail(c, errors.New("usernames cant contain @ sign"))
return
}
if _, ok := api.validateOrgOwner(c, forms["organization_name"], username); !ok {
return
}
// parse html encoded strings
forms["password"] = html.UnescapeString(forms["password"])
// create the org user. this process is similar to regular
// user registration, so we handle the errors in the same way
_, err = api.orgs.RegisterOrgUser(
forms["organization_name"],
forms["username"],
forms["password"],
forms["email_address"],
)
api.handleUserCreate(c, forms, err)
}
// getOrgUserUploads allows returning uploads for organization users
// optionally
func (api *API) getOrgUserUploads(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
forms, missingField := api.extractPostForms(c, "name", "user")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// allows optional returning the response as a generated csv file
asCSV := c.PostForm("as_csv") == "true"
// validate user is owner
if _, ok := api.validateOrgOwner(c, forms["name"], username); !ok {
return
}
if asCSV {
uplds, err := api.getUploads(forms["name"], []string{forms["user"]})
if err != nil {
api.LogError(c, err, "failed to get user uploads"+err.Error())
return
}
csvBytes, err := csvutil.Marshal(uplds[forms["user"]])
if err != nil {
api.LogError(c, err, "failed to generate csv file "+err.Error())
return
}
c.DataFromReader(
200,
int64(len(csvBytes)),
"application/octet-stream",
bytes.NewReader(csvBytes),
make(map[string]string),
)
return
}
page := c.PostForm("page")
if page == "" {
page = "1"
}
limit := c.PostForm("limit")
if limit == "" {
limit = "10"
}
pageInt, err := strconv.Atoi(page)
if err != nil {
Fail(c, err, http.StatusBadRequest)
return
}
limitInt, err := strconv.Atoi(limit)
if err != nil {
Fail(c, err, http.StatusBadRequest)
return
}
// validate that the user is part of the organization
// however dont fail on an error, simply continue
usr, err := api.um.FindByUserName(forms["user"])
if err != nil {
api.LogError(c, err, eh.UserSearchError)
return
}
if usr.Organization != forms["name"] {
Fail(c, errors.New("user is not part of organization"))
return
}
var uploads []models.Upload
paged, err := gpaginator.Paging(
&gpaginator.Param{
DB: api.upm.DB.Where("user_name = ?", forms["user"]),
Page: pageInt,
Limit: limitInt,
},
&uploads,
)
if err != nil {
api.LogError(c, err, "failed to get paged user upload")
return
}
// return the response
Respond(c, http.StatusOK, gin.H{"response": paged})
}
func (api *API) getUploads(orgName string, users []string) (map[string][]models.Upload, error) {
resp := make(map[string][]models.Upload)
for _, user := range users {
uplds, err := api.orgs.GetUserUploads(orgName, user)
if err != nil {
continue
}
resp[user] = uplds
}
return resp, nil
}
// returns true if user is owner
func (api *API) validateOrgOwner(c *gin.Context, organization, username string) (*models.Organization, bool) {
org, err := api.orgs.FindByName(organization)
if err != nil {
api.LogError(
c,
err,
"failed to find org",
)(http.StatusInternalServerError)
return nil, false
}
if org.AccountOwner != username {
api.LogError(
c,
errors.New("user is not owner"),
"you are not the organization owner",
)(http.StatusForbidden)
return nil, false
}
return org, true
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/api.go | api/v2/api.go | package v2
import (
"context"
"crypto/tls"
"fmt"
"net/http"
"os"
"strconv"
"time"
"github.com/RTradeLtd/ChainRider-Go/dash"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/Temporal/rtfscluster"
pbLens "github.com/RTradeLtd/grpc/lensv2"
pbOrch "github.com/RTradeLtd/grpc/nexus"
pbSigner "github.com/RTradeLtd/grpc/pay"
"github.com/RTradeLtd/kaas/v2"
"github.com/RTradeLtd/rtfs/v2"
"github.com/RTradeLtd/swampi"
recaptcha "github.com/ezzarghili/recaptcha-go"
pbBchWallet "github.com/gcash/bchwallet/rpc/walletrpc"
"github.com/streadway/amqp"
"github.com/ulule/limiter/v3"
mgin "github.com/ulule/limiter/v3/drivers/middleware/gin"
"github.com/ulule/limiter/v3/drivers/store/memory"
"go.uber.org/zap"
"github.com/RTradeLtd/config/v2"
stats "github.com/semihalev/gin-stats"
"github.com/RTradeLtd/Temporal/api/middleware"
"github.com/RTradeLtd/database/v2"
"github.com/RTradeLtd/database/v2/models"
"github.com/gin-gonic/gin"
)
// API is our API service
type API struct {
ipfs rtfs.Manager
ipfsCluster *rtfscluster.ClusterManager
keys keys
r *gin.Engine
cfg *config.TemporalConfig
dbm *database.Manager
um *models.UserManager
im *models.IpnsManager
pm *models.PaymentManager
ue *models.EncryptedUploadManager
upm *models.UploadManager
zm *models.ZoneManager
rm *models.RecordManager
nm *models.HostedNetworkManager
usage *models.UsageManager
orgs *models.OrgManager
l *zap.SugaredLogger
signer pbSigner.SignerClient
orch pbOrch.ServiceClient
lens pbLens.LensV2Client
bchWallet pbBchWallet.WalletServiceClient
dc *dash.Client
queues queues
service string
version string
swarmEndpoints []*swampi.Swampi
captcha recaptcha.ReCAPTCHA
captchaEnabled bool
}
// Initialize is used ot initialize our API service. debug = true is useful
// for debugging database issues.
func Initialize(
ctx context.Context,
// configuration
cfg *config.TemporalConfig,
version string,
opts Options,
clients Clients,
// API dependencies
l *zap.SugaredLogger,
) (*API, error) {
var (
err error
router = gin.Default()
)
// if we dont set this, rate limiting wont work properly
router.ForwardedByClientIP = true
// update dev mode
dev = opts.DevMode
l = l.Named("api")
im, err := rtfs.NewManager(
cfg.IPFS.APIConnection.Host+":"+cfg.IPFS.APIConnection.Port,
"", time.Minute*60,
)
if err != nil {
return nil, err
}
imCluster, err := rtfscluster.Initialize(
ctx,
cfg.IPFSCluster.APIConnection.Host,
cfg.IPFSCluster.APIConnection.Port,
)
if err != nil {
return nil, err
}
// set up API struct
api, err := new(cfg, router, l, clients, im, imCluster, opts.DebugLogging)
if err != nil {
return nil, err
}
api.version = version
if api.getCaptchaKey() != "" {
captcha, err := recaptcha.NewReCAPTCHA(api.getCaptchaKey(), recaptcha.V3, time.Second*20)
if err != nil {
return nil, err
}
api.captcha = captcha
api.captchaEnabled = true
}
// init routes
if err = api.setupRoutes(opts.DebugLogging); err != nil {
return nil, err
}
api.l.Info("api initialization successful")
// return our configured API service
return api, nil
}
func new(cfg *config.TemporalConfig, router *gin.Engine, l *zap.SugaredLogger, clients Clients, ipfs rtfs.Manager, ipfsCluster *rtfscluster.ClusterManager, debug bool) (*API, error) {
var (
dbm *database.Manager
err error
)
// set up database manager
dbm, err = database.New(cfg, database.Options{LogMode: debug})
if err != nil {
l.Warnw("failed to connect to database with secure connection - attempting insecure", "error", err.Error())
dbm, err = database.New(cfg, database.Options{
LogMode: debug,
SSLModeDisable: true,
})
if err != nil {
return nil, fmt.Errorf("failed to connect to database with insecure connection: %s", err.Error())
}
l.Warn("insecure database connection established")
} else {
l.Info("secure database connection established")
}
var networkVersion string
if dev {
networkVersion = "testnet"
} else {
networkVersion = "main"
}
dc := dash.NewClient(&dash.ConfigOpts{
APIVersion: "v1",
DigitalCurrency: "dash",
//TODO: change to main before production release
Blockchain: networkVersion,
Token: cfg.APIKeys.ChainRider,
})
kb1, err := kaas.NewClient(cfg.Services, false)
if err != nil {
return nil, err
}
kb2, err := kaas.NewClient(cfg.Services, true)
if err != nil {
return nil, err
}
// setup our queues
qmIpns, err := queue.New(queue.IpnsEntryQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("ipns"))
if err != nil {
return nil, err
}
qmPin, err := queue.New(queue.IpfsPinQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("pin"))
if err != nil {
return nil, err
}
qmCluster, err := queue.New(queue.IpfsClusterPinQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("cluster"))
if err != nil {
return nil, err
}
qmEmail, err := queue.New(queue.EmailSendQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("email"))
if err != nil {
return nil, err
}
qmKey, err := queue.New(queue.IpfsKeyCreationQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("key"))
if err != nil {
return nil, err
}
qmDash, err := queue.New(queue.DashPaymentConfirmationQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("dash"))
if err != nil {
return nil, err
}
qmEth, err := queue.New(queue.EthPaymentConfirmationQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("eth"))
if err != nil {
return nil, err
}
qmBch, err := queue.New(queue.BitcoinCashPaymentConfirmationQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("bch"))
if err != nil {
return nil, err
}
qmENS, err := queue.New(queue.ENSRequestQueue, cfg.RabbitMQ.URL, true, dev, cfg, l.Named("ens"))
if err != nil {
return nil, err
}
if cfg.Stripe.SecretKey == "" {
stripeSecretKey := os.Getenv("STRIPE_SECRET_KEY")
cfg.Stripe.SecretKey = stripeSecretKey
}
if cfg.Stripe.PublishableKey == "" {
stripePublishableKey := os.Getenv("STRIPE_PUBLISHABLE_KEY")
cfg.Stripe.PublishableKey = stripePublishableKey
}
// return
return &API{
ipfs: ipfs,
ipfsCluster: ipfsCluster,
keys: keys{kb1: kb1, kb2: kb2},
cfg: cfg,
service: "api",
r: router,
l: l,
dbm: dbm,
um: models.NewUserManager(dbm.DB),
im: models.NewIPNSManager(dbm.DB),
pm: models.NewPaymentManager(dbm.DB),
ue: models.NewEncryptedUploadManager(dbm.DB),
upm: models.NewUploadManager(dbm.DB),
usage: models.NewUsageManager(dbm.DB),
orgs: models.NewOrgManager(dbm.DB),
lens: clients.Lens,
signer: clients.Signer,
orch: clients.Orch,
bchWallet: clients.BchWallet,
dc: dc,
queues: queues{
pin: qmPin,
cluster: qmCluster,
email: qmEmail,
ipns: qmIpns,
key: qmKey,
dash: qmDash,
eth: qmEth,
bch: qmBch,
ens: qmENS,
},
swarmEndpoints: getSwarmEndpoints(cfg.Ethereum),
zm: models.NewZoneManager(dbm.DB),
rm: models.NewRecordManager(dbm.DB),
nm: models.NewHostedNetworkManager(dbm.DB),
}, nil
}
// Close releases API resources
func (api *API) Close() {
// close queue resources
if err := api.queues.cluster.Close(); err != nil {
api.l.Error(err, "failed to properly close cluster queue connection")
}
if err := api.queues.email.Close(); err != nil {
api.l.Error(err, "failed to properly close email queue connection")
}
if err := api.queues.ipns.Close(); err != nil {
api.l.Error(err, "failed to properly close ipns queue connection")
}
if err := api.queues.key.Close(); err != nil {
api.l.Error(err, "failed to properly close key queue connection")
}
if err := api.queues.pin.Close(); err != nil {
api.l.Error(err, "failed to properly close pin queue connection")
}
}
// TLSConfig is used to enable TLS on the API service
type TLSConfig struct {
CertFile string
KeyFile string
}
// ListenAndServe spins up the API server
func (api *API) ListenAndServe(ctx context.Context, addr string, tlsConfig *TLSConfig) error {
server := &http.Server{
Addr: addr,
Handler: api.r,
}
errChan := make(chan error, 1)
go func() {
if tlsConfig != nil {
// configure TLS to override defaults
tlsCfg := &tls.Config{
CurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256},
//PreferServerCipherSuites: true,
CipherSuites: []uint16{
// http/2 mandated supported cipher
// unforunately this is a less secure cipher
// but specifying it first is the only way to accept
// http/2 connections without go throwing an error
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
// super duper secure ciphers
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
},
// consider whether or not to fix to tls1.2
MinVersion: tls.VersionTLS11,
}
// set tls configuration
server.TLSConfig = tlsCfg
errChan <- server.ListenAndServeTLS(tlsConfig.CertFile, tlsConfig.KeyFile)
return
}
errChan <- server.ListenAndServe()
}()
for {
select {
case err := <-errChan:
return err
case <-ctx.Done():
return server.Close()
case msg := <-api.queues.cluster.ErrCh:
qmCluster, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.IpfsClusterPinQueue, true)
if err != nil {
return server.Close()
}
api.queues.cluster = qmCluster
case msg := <-api.queues.dash.ErrCh:
qmDash, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.DashPaymentConfirmationQueue, true)
if err != nil {
return server.Close()
}
api.queues.dash = qmDash
case msg := <-api.queues.email.ErrCh:
qmEmail, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.EmailSendQueue, true)
if err != nil {
return server.Close()
}
api.queues.email = qmEmail
case msg := <-api.queues.ipns.ErrCh:
qmIpns, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.IpnsEntryQueue, true)
if err != nil {
return server.Close()
}
api.queues.ipns = qmIpns
case msg := <-api.queues.key.ErrCh:
qmKey, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.IpfsKeyCreationQueue, true)
if err != nil {
return server.Close()
}
api.queues.key = qmKey
case msg := <-api.queues.eth.ErrCh:
qmEth, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.EthPaymentConfirmationQueue, true)
if err != nil {
return server.Close()
}
api.queues.eth = qmEth
case msg := <-api.queues.pin.ErrCh:
qmPin, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.IpfsPinQueue, true)
if err != nil {
return server.Close()
}
api.queues.pin = qmPin
case msg := <-api.queues.bch.ErrCh:
qmBch, err := api.handleQueueError(msg, api.cfg.RabbitMQ.URL, queue.BitcoinCashPaymentConfirmationQueue, true)
if err != nil {
return server.Close()
}
api.queues.bch = qmBch
}
}
}
// setupRoutes is used to setup all of our api routes
func (api *API) setupRoutes(debug bool) error {
var (
connLimit int
err error
)
if api.cfg.API.Connection.Limit == "" {
connLimit = 50
} else {
// setup the connection limit
connLimit, err = strconv.Atoi(api.cfg.API.Connection.Limit)
if err != nil {
return err
}
}
// make sure we dont throttle dev too much
var rateLimit string
if dev {
rateLimit = "100000-H"
} else {
rateLimit = fmt.Sprintf("%v-H", connLimit)
}
rate, err := limiter.NewRateFromFormatted(rateLimit)
if err != nil {
return err
}
// ensure we have valid cors configuration, otherwise default to allow all
var allowedOrigins []string
if len(api.cfg.API.Connection.CORS.AllowedOrigins) > 0 {
allowedOrigins = api.cfg.API.Connection.CORS.AllowedOrigins
}
// set up defaults
api.r.Use(
// cors middleware
middleware.CORSMiddleware(dev, debug, allowedOrigins),
// allows for automatic xss removal
// greater than what can be configured with HTTP Headers
xssMdlwr.RemoveXss(),
// rate limiting
mgin.NewMiddleware(limiter.New(memory.NewStore(), rate)),
// security middleware
middleware.NewSecWare(dev),
// request id middleware
middleware.RequestID(),
// stats middleware
stats.RequestStats())
// set up middleware
ginjwt := middleware.JwtConfigGenerate(api.cfg.JWT.Key, api.cfg.JWT.Realm, api.dbm.DB, api.l)
authware := []gin.HandlerFunc{ginjwt.MiddlewareFunc()}
// V2 API
v2 := api.r.Group("/v2")
// system checks used to verify the integrity of our services
systemChecks := v2.Group("/systems")
{
systemChecks.GET("/check", api.SystemsCheck)
}
// authless account recovery routes
forgot := v2.Group("/forgot")
{
forgot.POST("/username", api.forgotUserName)
forgot.POST("/password", api.resetPassword)
}
// authentication
auth := v2.Group("/auth")
{
auth.POST("/register", api.registerUserAccount)
auth.POST("/login", ginjwt.LoginHandler)
auth.GET("/refresh", ginjwt.RefreshHandler)
}
// statistics
statistics := v2.Group("/statistics").Use(authware...)
{
statistics.GET("/stats", api.getStats)
}
// lens search engine
lens := v2.Group("/lens")
{
lens.POST("/index", api.submitIndexRequest)
// only allow registered users to search
lens.POST("/search", api.submitSearchRequest)
}
// payments
payments := v2.Group("/payments", authware...)
{
dash := payments.Group("/dash")
{
dash.POST("/create", api.CreateDashPayment)
}
eth := payments.Group("/eth")
{
eth.POST("/request", api.RequestSignedPaymentMessage)
eth.POST("/confirm", api.ConfirmETHPayment)
}
bch := payments.Group("/bch")
{
bch.POST("/create", api.createBchPayment)
bch.POST("/confirm", api.confirmBchPayment)
}
stripe := payments.Group("/stripe")
{
stripe.POST("/charge", api.stripeCharge)
}
payments.GET("/status/:number", api.getPaymentStatus)
}
// accounts
account := v2.Group("/account")
{
token := account.Group("/token", authware...)
{
token.GET("/username", api.getUserFromToken)
}
password := account.Group("/password", authware...)
{
password.POST("/change", api.changeAccountPassword)
}
key := account.Group("/key", authware...)
{
key.GET("/export/:name", api.exportKey)
ipfs := key.Group("/ipfs")
{
ipfs.GET("/get", api.getIPFSKeyNamesForAuthUser)
ipfs.POST("/new", api.createIPFSKey)
}
}
credits := account.Group("/credits", authware...)
{
credits.GET("/available", api.getCredits)
}
email := account.Group("/email")
{
// auth-less account email routes
token := email.Group("/verify")
{
token.GET("/:user/:token", api.verifyEmailAddress)
}
// authenticatoin email routes
auth := email.Use(authware...)
{
auth.POST("/forgot", api.forgotEmail)
}
}
auth := account.Use(authware...)
{
// used to upgrade account to light tier
auth.POST("/upgrade", api.upgradeAccount)
auth.GET("/usage", api.usageData)
}
}
// ipfs routes
ipfs := v2.Group("/ipfs", authware...)
{
// public ipfs routes
public := ipfs.Group("/public")
{
// pinning routes
pin := public.Group("/pin")
{
pin.POST("/:hash", api.pinHashLocally)
pin.POST("/:hash/extend", api.extendPin)
}
// file upload routes
file := public.Group("/file")
{
file.POST("/add", api.addFile)
}
// pubsub routes
pubsub := public.Group("/pubsub")
{
pubsub.POST("/publish/:topic", api.ipfsPubSubPublish)
}
// general routes
public.GET("/stat/:hash", api.getObjectStatForIpfs)
public.GET("/dag/:hash", api.getDagObject)
}
// private ipfs routes
private := ipfs.Group("/private")
{
// network management routes
private.GET("/networks", api.getAuthorizedPrivateNetworks)
network := private.Group("/network")
{
users := network.Group("/users")
{
users.DELETE("/remove", api.removeUsersFromNetwork)
users.POST("/add", api.addUsersToNetwork)
}
owners := network.Group("/owners")
{
owners.POST("/add", api.addOwnersToNetwork)
}
network.GET("/:name", api.getIPFSPrivateNetworkByName)
network.POST("/new", api.createIPFSNetwork)
network.POST("/stop", api.stopIPFSPrivateNetwork)
network.POST("/start", api.startIPFSPrivateNetwork)
network.DELETE("/remove", api.removeIPFSPrivateNetwork)
}
// pinning routes
pin := private.Group("/pin")
{
pin.POST("/:hash", api.pinToHostedIPFSNetwork)
pin.GET("/check/:hash/:networkName", api.checkLocalNodeForPinForHostedIPFSNetwork)
}
// file upload routes
file := private.Group("/file")
{
file.POST("/add", api.addFileToHostedIPFSNetwork)
}
// pubsub routes
pubsub := private.Group("/pubsub")
{
pubsub.POST("/publish/:topic", api.ipfsPubSubPublishToHostedIPFSNetwork)
}
// object stat route
private.GET("/stat/:hash/:networkName", api.getObjectStatForIpfsForHostedIPFSNetwork)
// general routes
private.GET("/dag/:hash/:networkName", api.getDagObjectForHostedIPFSNetwork)
private.GET("/uploads/:networkName", api.getUploadsByNetworkName)
}
// utility routes
utils := ipfs.Group("/utils")
{
// generic download
utils.POST("/download/:hash", api.downloadContentHash)
laser := utils.Group("/laser")
{
laser.POST("/beam", api.beamContent)
}
}
}
// ipns
ipns := v2.Group("/ipns", authware...)
{
// public ipns routes
public := ipns.Group("/public")
{
public.POST("/publish/details", api.publishToIPNSDetails)
// used to handle pinning of IPNS records on public ipfs
// this involves first resolving the record, parsing it
// and extracting the hash to pin
public.POST("/pin", api.pinIPNSHash)
}
// general routes
ipns.GET("/records", api.getIPNSRecordsPublishedByUser)
}
// database
database := v2.Group("/database", authware...)
{
database.GET("/uploads", api.getUploadsForUser)
database.GET("/uploads/encrypted", api.getEncryptedUploadsForUser)
database.POST("/uploads/search", api.searchUploadsForUser)
}
// frontend
frontend := v2.Group("/frontend", authware...)
{
cost := frontend.Group("/cost")
{
calculate := cost.Group("/calculate")
{
calculate.GET("/:hash/:hold_time", api.calculatePinCost)
calculate.POST("/file", api.calculateFileCost)
}
}
}
// organization routes
org := v2.Group("/org", authware...)
{
get := org.Group("/get")
{
get.GET("/model", api.getOrganization)
get.GET("/billing/report", api.getOrgBillingReport)
}
org.POST("/new", api.newOrganization)
org.POST("/register/user", api.registerOrgUser)
org.POST("/user/uploads", api.getOrgUserUploads)
}
// ens routes
ens := v2.Group("/ens", authware...)
{
ens.POST("/claim", api.ClaimENSName)
ens.POST("/update", api.UpdateContentHash)
}
if api.captchaEnabled {
recap := v2.Group("/captcha")
{
recap.POST("/verify", api.verifyCaptcha)
}
}
// swarm routes
swarm := v2.Group("/swarm", authware...)
{
swarm.POST("/upload", api.SwarmUpload)
}
api.l.Info("Routes initialized")
return nil
}
// HandleQueueError is used to handle queue connectivity issues requiring us to re-connect
func (api *API) handleQueueError(amqpErr *amqp.Error, rabbitMQURL string, queueType queue.Queue, publish bool) (*queue.Manager, error) {
api.l.Errorw(
"a protocol connection error stopping rabbitmq was received",
"queue", queueType.String(),
"error", amqpErr.Error())
qManager, err := queue.New(queueType, rabbitMQURL, publish, dev, api.cfg, api.l)
if err != nil {
api.l.Errorw(
"failed to re-establish queue process, exiting",
"queue", queueType.String(),
"error", err.Error())
return nil, err
}
api.l.Warnw(
"successfully re-established queue connection", "queue", queueType.String())
return qManager, nil
}
// currently only supports 2 endpoints
func getSwarmEndpoints(cfg config.Ethereum) []*swampi.Swampi {
var endpoints []*swampi.Swampi
if cfg.Swarm.URL1 != "" {
endpoints = append(endpoints, swampi.New(cfg.Swarm.URL1))
}
if cfg.Swarm.URL2 != "" {
endpoints = append(endpoints, swampi.New(cfg.Swarm.URL2))
}
return endpoints
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_payment.go | api/v2/routes_payment.go | package v2
import (
"context"
"errors"
"fmt"
"net/http"
"strconv"
"github.com/gcash/bchutil"
"github.com/stripe/stripe-go/charge"
"github.com/RTradeLtd/Temporal/eh"
"github.com/jinzhu/gorm"
"github.com/stripe/stripe-go"
"github.com/RTradeLtd/ChainRider-Go/dash"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/Temporal/utils"
greq "github.com/RTradeLtd/grpc/pay/request"
pbBchWallet "github.com/gcash/bchwallet/rpc/walletrpc"
"github.com/gin-gonic/gin"
)
// ConfirmETHPayment is used to confirm an ethereum based payment
func (api *API) ConfirmETHPayment(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "payment_number", "tx_hash")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// parse payment number
paymentNumberInt, err := strconv.ParseInt(forms["payment_number"], 10, 64)
if err != nil {
Fail(c, err)
return
}
// check to see if this payment is already registered
payment, err := api.pm.FindPaymentByNumber(username, paymentNumberInt)
if err != nil {
api.LogError(c, err, eh.PaymentSearchError)(http.StatusBadRequest)
return
}
// validate that the payment is for the appropriate blockchain
if payment.Blockchain != "ethereum" {
Fail(c, errors.New("payment you are trying to confirm is not for the ethereum blockchain"))
return
}
// this is used to prevent people from abusing the payment system, and getting
// a single payment to be processed multiple times without having to send additional funds
if payment.TxHash[0:2] == "0x" {
Fail(c, errors.New("payment is already being processed, if your payment hasn't been confirmed after 90 minutes please contact support@rtradetechnologies.com"))
return
}
// update payment with the new tx hash
if _, err = api.pm.UpdatePaymentTxHash(username, forms["tx_hash"], paymentNumberInt); err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
// create payment confirmation message
paymentConfirmation := queue.EthPaymentConfirmation{
UserName: username,
PaymentNumber: paymentNumberInt,
}
// send message for processing
if err = api.queues.eth.PublishMessage(paymentConfirmation); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": payment})
}
// RequestSignedPaymentMessage is used to get a signed message from the GRPC API Payments Server
// this is currently used for ETH+RTC smart-contract facilitated payments
func (api *API) RequestSignedPaymentMessage(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "payment_type", "sender_address", "credit_value")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
var (
paymentType string
method uint64
)
// ensure it is a valid payment type
switch forms["payment_type"] {
case "0":
paymentType = "rtc"
method = 0
case "1":
paymentType = "eth"
method = 1
default:
Fail(c, errors.New("payment_type must be '0 (rtc)' or '1 (eth)'"))
return
}
// get the current value of a single (ie, 1.0 eth) unit of currency of the given payment type
usdValueFloat, err := api.getUSDValue(paymentType)
if err != nil {
api.LogError(c, err, eh.CmcCheckError)(http.StatusBadRequest)
return
}
// get the number of the current payment we are processing
paymentNumber, err := api.pm.GetLatestPaymentNumber(username)
if err != nil && err != gorm.ErrRecordNotFound {
api.LogError(c, err, eh.PaymentSearchError)(http.StatusBadRequest)
return
}
// convert the credits the user wants to buy from string to float
creditValueFloat, err := strconv.ParseFloat(forms["credit_value"], 64)
if err != nil {
Fail(c, err)
return
}
// calculate how much of the given currency we need to charge them
chargeAmountFloat := creditValueFloat / usdValueFloat
// convert the float to a big int, as whenever we are processing uint256 in our smart contracts, this is the equivalent of a big.Int in golang
chargeAmountBig := utils.FloatToBigInt(chargeAmountFloat)
// format the big int, as a string
chargeAmountString := chargeAmountBig.String()
// do some formatting
numberString := strconv.FormatInt(paymentNumber, 10)
methodString := strconv.FormatUint(method, 10)
// the following pieces of information are used to construct a hash which we then sign
// using this signed hash, we can then present it to the smart contract, along with the data needed to reconstruct the hash
// by presenting this information to the smart contract via a transaction sent by the senderAddress, we can validate our payment
// on-chain, in a trustless manner ensuring transfer of payment and validation of payment within a single smart contract call.
signRequest := greq.SignRequest{
// the address that will be sending the transactoin
Address: forms["sender_address"],
// the method of the payment
Method: methodString,
// the number of the current payment
Number: numberString,
// the amount we are charging them
ChargeAmount: chargeAmountString,
}
// send a call to the signer service, which will take the data, hash it, and sign it
// using the returned values, we have the information needed to send a call to the smart contract
resp, err := api.signer.GetSignedMessage(context.Background(), &signRequest)
if err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
// format a unique payment number to take the place of deposit address and tx hash temporarily
paymentNumberString := fmt.Sprintf("%s-%s", username, strconv.FormatInt(paymentNumber, 10))
if _, err = api.pm.NewPayment(
paymentNumber,
paymentNumberString,
paymentNumberString,
creditValueFloat,
chargeAmountFloat,
"ethereum",
paymentType,
username,
); err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
// parse the v parameter into uint type
vUint, err := strconv.ParseUint(resp.GetV(), 10, 64)
if err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
// format signed message components to send to be used
// for submission to contracts
formattedH := fmt.Sprintf("0x%s", resp.GetH())
formattedR := fmt.Sprintf("0x%s", resp.GetR())
formattedS := fmt.Sprintf("0x%s", resp.GetS())
response := gin.H{
"charge_amount_big": chargeAmountString,
"method": uint8(method),
"payment_number": paymentNumber,
"prefixed": true,
"v": uint8(vUint),
"formatted": gin.H{
"h": formattedH,
"r": formattedR,
"s": formattedS,
},
}
// return
Respond(c, http.StatusOK, gin.H{"response": response})
}
func (api *API) createBchPayment(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
forms, missingField := api.extractPostForms(c, "credit_value")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
usdValueFloat, err := api.getUSDValue("bch")
if err != nil {
Fail(c, err)
return
}
creditValueFloat, err := strconv.ParseFloat(forms["credit_value"], 64)
if err != nil {
Fail(c, err)
return
}
chargeAmountFloat := creditValueFloat / usdValueFloat
paymentNumber, err := api.pm.GetLatestPaymentNumber(username)
if err != nil {
api.LogError(c, err, eh.PaymentSearchError)(http.StatusBadRequest)
return
}
/*
addrReq, err := api.bchWallet.CurrentAddress(context.Background(), &pbBchWallet.CurrentAddressRequest{Account: 0})
if err != nil {
api.LogError(c, err, "failed to get bch deposit address", http.StatusInternalServerError)
return
}
one thing to note about the below solution, this is technically only usable with a fully synced blockchain
so it may/may not cause issues in the future. If this does cause issues, then we will need to disable
this section, and enable the previously commented section above
this is temporary fix until the underlying issue is fixed
https://github.com/gcash/bchwallet/issues/41
*/
addrReq, err := api.bchWallet.NextAddress(context.Background(), &pbBchWallet.NextAddressRequest{Account: 0})
if err != nil {
api.LogError(c, err, "failed to get bch deposit address", http.StatusInternalServerError)
return
}
bchChargeAmount, err := bchutil.NewAmount(chargeAmountFloat)
if err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
// format a unique payment number to take the place of deposit address and tx hash temporarily
paymentNumberString := fmt.Sprintf("%s-%s", username, strconv.FormatInt(paymentNumber, 10))
if _, err := api.pm.NewPayment(
paymentNumber,
addrReq.GetAddress(),
// temporary fake tx hash
// will get updated when
// confirming the payment
paymentNumberString,
creditValueFloat,
bchChargeAmount.ToBCH(),
"bitcoin-cash",
"bch",
username,
); err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
response := gin.H{
"deposit_address": addrReq.GetAddress(),
"charge_amount": bchChargeAmount.ToBCH(),
"payment_number": paymentNumber,
}
Respond(c, http.StatusOK, gin.H{"response": response})
}
func (api *API) confirmBchPayment(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
forms, missingField := api.extractPostForms(c, "payment_number", "tx_hash")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// parse payment number
paymentNumberInt, err := strconv.ParseInt(forms["payment_number"], 10, 64)
if err != nil {
Fail(c, err)
return
}
// check to see if this payment is already registered
payment, err := api.pm.FindPaymentByNumber(username, paymentNumberInt)
if err != nil {
api.LogError(c, err, eh.PaymentSearchError)(http.StatusBadRequest)
return
}
if payment.Blockchain != "bitcoin-cash" {
Fail(c, errors.New("payment you are trying to confirm is not for the bitcoin-cash blockchain"))
return
}
if payment.Confirmed {
Fail(c, errors.New("payment is already confirmed"))
return
}
// when a payment is first created, we insert temporary data into the TxHash field
// this field only gets updated when confirming a payment. In order to prevent
// abuse and multiple transactions being submitted for the same payment
// before it is confirmed, ensure that we only allow processing if the temporary
// TxHash is present
if payment.TxHash != fmt.Sprintf("%s-%s", username, strconv.FormatInt(payment.Number, 10)) {
Fail(c, errors.New("payment is already being processed"))
return
}
if _, err := api.pm.UpdatePaymentTxHash(username, forms["tx_hash"], paymentNumberInt); err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
confirmation := queue.BchPaymentConfirmation{
UserName: username,
PaymentNumber: paymentNumberInt,
}
if err := api.queues.bch.PublishMessage(confirmation); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
Respond(c, http.StatusOK, gin.H{"response": confirmation})
}
// CreateDashPayment is used to create a dash payment via chainrider
func (api *API) CreateDashPayment(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
forms, missingField := api.extractPostForms(c, "credit_value")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
usdValueFloat, err := api.getUSDValue("dash")
if err != nil {
Fail(c, err)
return
}
creditValueFloat, err := strconv.ParseFloat(forms["credit_value"], 64)
if err != nil {
Fail(c, err)
return
}
chargeAmountFloat := creditValueFloat / usdValueFloat
paymentNumber, err := api.pm.GetLatestPaymentNumber(username)
if err != nil {
api.LogError(c, err, eh.PaymentSearchError)(http.StatusBadRequest)
return
}
// as we require tx hashes be unique in the database
// we need to create a fake, but also unique value as a temporary place holder
fakeTxHash := fmt.Sprintf("%s-%v", username, paymentNumber)
// dash is only up to 8 decimals, so we must parse accordingly
chargeAmountParsed := fmt.Sprintf("%.8f", chargeAmountFloat)
chargeAmountFloat, err = strconv.ParseFloat(chargeAmountParsed, 64)
if err != nil {
Fail(c, err)
}
response, err := api.dc.CreatePaymentForward(
&dash.PaymentForwardOpts{
DestinationAddress: api.cfg.Wallets.DASH,
},
)
if err != nil {
api.LogError(c, err, eh.ChainRiderAPICallError, "wallet_address", api.cfg.Wallets.DASH)(http.StatusBadRequest)
return
}
if response.Error != "" {
api.LogError(c, errors.New(response.Error), eh.ChainRiderAPICallError, "wallet_address", api.cfg.Wallets.DASH)(http.StatusBadRequest)
return
}
if _, err = api.pm.NewPayment(
paymentNumber,
response.PaymentAddress,
fakeTxHash,
creditValueFloat,
chargeAmountFloat,
"dash",
"dash",
username,
); err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
confirmation := &queue.DashPaymenConfirmation{
UserName: username,
PaymentForwardID: response.PaymentForwardID,
PaymentNumber: paymentNumber,
}
if err = api.queues.dash.PublishMessage(confirmation); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
type pay struct {
PaymentNumber int64
ChargeAmount float64
Blockchain string
Status string
Network string
DepositAddress string
PaymentForwardID string
}
// calculate the mining fee required by chainrider to forward the payment
miningFeeDash := dash.DuffsToDash(float64(int64(response.MiningFeeDuffs)))
// update the charge amount with the mining fee
chargeAmountFloat = chargeAmountFloat + miningFeeDash
p := pay{
PaymentNumber: paymentNumber,
ChargeAmount: chargeAmountFloat,
Blockchain: "dash",
Status: "please send exactly the charge amount. The mining fee required by the chainrider payment forward api call is incldued in the charge amount",
//TODO: change to main before production release
Network: "main",
DepositAddress: response.PaymentAddress,
PaymentForwardID: response.PaymentForwardID,
}
Respond(c, http.StatusOK, gin.H{"response": p})
}
func (api *API) stripeCharge(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
forms, missingField := api.extractPostForms(c, "stripe_token", "stripe_email", "value_in_cents")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
valueInCentsInt, err := strconv.ParseInt(forms["value_in_cents"], 10, 64)
if err != nil {
Fail(c, err)
return
}
valueInCentsFloat, err := strconv.ParseFloat(forms["value_in_cents"], 64)
if err != nil {
Fail(c, err)
return
}
// set the secret key after input validation
stripe.Key = api.cfg.Stripe.SecretKey
// set the source for the charge
// in this case it is a tokenized version of the credit card
source, err := stripe.SourceParamsFor(forms["stripe_token"])
if err != nil {
Fail(c, err)
return
}
// initialize credit card charge parameters
ch, err := charge.New(&stripe.ChargeParams{
Amount: stripe.Int64(valueInCentsInt),
Currency: stripe.String(string(stripe.CurrencyUSD)),
Description: stripe.String("temporal credit purchase"),
// StatementDescriptor is what appears in their credit card billing report
StatementDescriptor: stripe.String("credit purchase"),
// email the receipt goes to
ReceiptEmail: stripe.String(forms["stripe_email"]),
Source: source,
Params: stripe.Params{
Metadata: map[string]string{
"order_type": "temporal.credits",
},
},
})
if err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
api.l.Infow("payment complete", "payment.method", "stripe", "user", username, "charge", ch)
// add credits to use
if _, err := api.um.AddCredits(username, valueInCentsFloat/100); err != nil {
api.LogError(c, err, "failed to grant credits")(http.StatusInternalServerError)
return
}
api.l.Infow("credits granted", "payment.method", "stripe", "credit.amount", valueInCentsFloat/100)
Respond(c, http.StatusOK, gin.H{"response": "stripe credit purchase successful"})
}
// GetPaymentStatus is used to retrieve whether or not a payment is confirmed
func (api *API) getPaymentStatus(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
number, err := strconv.ParseInt(c.Param("number"), 10, 64)
if err != nil {
Fail(c, err)
return
}
payment, err := api.pm.FindPaymentByNumber(username, number)
if err != nil {
api.LogError(c, err, eh.PaymentSearchError)(http.StatusBadRequest)
return
}
Respond(c, http.StatusOK, gin.H{"response": payment.Confirmed})
}
// GetUSDValue is used to retrieve the usd value of a given payment type
func (api *API) getUSDValue(paymentType string) (float64, error) {
var (
cost float64
err error
)
switch paymentType {
case "eth":
cost, err = utils.RetrieveUsdPrice("ethereum", api.getCMCKey())
case "xmr":
cost, err = utils.RetrieveUsdPrice("monero", api.getCMCKey())
case "dash":
cost, err = utils.RetrieveUsdPrice("dash", api.getCMCKey())
case "btc":
cost, err = utils.RetrieveUsdPrice("bitcoin", api.getCMCKey())
case "bch":
cost, err = utils.RetrieveUsdPrice("bitcoin-cash", api.getCMCKey())
case "ltc":
cost, err = utils.RetrieveUsdPrice("litecoin", api.getCMCKey())
case "rtc":
cost, err = RtcCostUsd, nil
default:
return 0, errors.New(eh.InvalidPaymentTypeError)
}
// if we have an error, and the cost is 0 return the error
// otherwise if we have an error, and a non-zero cost
// then we should return the most recent price we have
if err != nil && cost == 0 {
return 0, err
}
return cost, nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/log_test.go | api/v2/log_test.go | package v2
import (
"encoding/json"
"errors"
"io/ioutil"
"net/http"
"net/http/httptest"
"strings"
"testing"
"go.uber.org/zap"
"go.uber.org/zap/zaptest/observer"
"github.com/gin-gonic/gin"
)
func TestAPI_LogError(t *testing.T) {
type args struct {
err error
message string
fields []interface{}
}
tests := []struct {
name string
args args
wantLog string
wantResp string
}{
{"with err no message", args{errors.New("hi"), "", nil}, "hi", "hi"},
{"with err and message", args{errors.New("hi"), "bye", nil}, "hi", "bye"},
{"message and additional fields", args{errors.New("hi"), "hi", []interface{}{"wow", "amazing"}}, "amazing", "hi"},
{"message and odd fields should ignore fields", args{errors.New("hi"), "hi", []interface{}{"wow"}}, "hi", "hi"},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
observer, out := observer.New(zap.InfoLevel)
logger := zap.New(observer).Sugar()
r := httptest.NewRecorder()
c, e := gin.CreateTestContext(r)
api := API{l: logger, service: "test", r: e}
// log error and execute callback
c.Request = httptest.NewRequest("GET", "/", nil)
if tt.args.fields != nil {
api.LogError(c, tt.args.err, tt.args.message, tt.args.fields...)(http.StatusBadRequest)
} else {
api.LogError(c, tt.args.err, tt.args.message)(http.StatusBadRequest)
}
// check log message and context
b, _ := json.Marshal(out.All()[0].ContextMap())
entry := out.All()[0].Message + string(b)
if !strings.Contains(entry, tt.wantLog) {
t.Errorf("got %s, want %s", entry, tt.wantLog)
}
// check http response
b, err := ioutil.ReadAll(r.Body)
if err != nil {
t.Error(err)
}
if strings.Count(string(b), tt.wantResp) > 1 {
t.Errorf("had duplicate counts of %s", tt.wantResp)
}
if !strings.Contains(string(b), tt.wantResp) {
t.Errorf("got %s, want %s", string(b), tt.wantResp)
}
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_ipns_test.go | api/v2/routes_ipns_test.go | package v2
import (
"net/url"
"testing"
"time"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
shell "github.com/RTradeLtd/go-ipfs-api"
)
var (
validIPNSTestPath = "/ipns/docs.api.temporal.cloud"
badIPNSTestPath = "/not/a/real/path"
validResolveResult = "/ipfs/QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"
)
func Test_API_Routes_IPNS_Publish(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// create a fake key for testing purposes
models.NewUserManager(db).AddIPFSKeyForUser("testuser", "mytestkey", "suchkeymuchwow")
type args struct {
hash string
lifeTime string
ttl string
key string
resolve string
}
tests := []struct {
name string
args args
wantStatus int
}{
{"Fail-Does-Not-Own-Key", args{hash, "24h", "1h", "notarealkeythisuserowns", "true"}, 400},
{"Fail-Bad-Hash", args{"notavalidipfshash", "24h", "1h", "mytestkey", "true"}, 400},
{"Success", args{hash, "24h", "1h", "mytestkey", "true"}, 200},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
var apiResp apiResponse
urlValues := url.Values{}
urlValues.Add("hash", tt.args.hash)
urlValues.Add("life_time", tt.args.lifeTime)
urlValues.Add("ttl", tt.args.ttl)
urlValues.Add("key", tt.args.key)
urlValues.Add("resolve", tt.args.resolve)
if err := sendRequest(
api, "POST", "/v2/ipns/public/publish/details", tt.wantStatus, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
})
}
}
func Test_API_Routes_IPNS_GET(t *testing.T) {
type args struct {
keyID string
keyName string
hash string
network string
user string
ttl time.Duration
lifeTime time.Duration
}
tests := []struct {
name string
args args
wantStatus int
}{
{"Fail", args{"blah", "blah", "blah", "blah", "blah", time.Minute, time.Minute}, 200},
{"Success", args{"fakeyKeyID", "fakekeyName", "fakeHash", "public", "testuser", time.Minute, time.Minute}, 200},
}
for _, tt := range tests {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
if tt.wantStatus == 200 {
if _, err := models.NewIPNSManager(db).CreateEntry(
tt.args.keyID,
tt.args.hash,
tt.args.keyName,
tt.args.network,
tt.args.user,
tt.args.lifeTime,
tt.args.ttl,
); err != nil {
t.Fatal(err)
}
}
var intAPIResp interfaceAPIResponse
if err := sendRequest(
api, "GET", "/v2/ipns/records", tt.wantStatus, nil, nil, &intAPIResp,
); err != nil {
t.Fatal(err)
}
intAPIResp = interfaceAPIResponse{}
if err := sendRequestPaged(
api,
"GET",
"/v2/ipns/records",
200,
nil,
url.Values{"paged": {"true"}},
&intAPIResp,
); err != nil {
t.Fatal(err)
}
}
}
func Test_API_Routes_IPNS_Pin(t *testing.T) {
type args struct {
holdTime string
ipnsPath string
}
tests := []struct {
name string
args args
wantStatus int
}{
{"Success", args{"1", validIPNSTestPath}, 200},
{"Fail-Bad-Hold-Time", args{"notanumber", validIPNSTestPath}, 400},
{"Fail-Bad-IPNS-Path", args{"1", badIPNSTestPath}, 400},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
fakeManager := &mocks.FakeManager{}
api.ipfs = fakeManager
fakeManager.ResolveReturnsOnCall(0, validResolveResult, nil)
fakeManager.StatReturnsOnCall(0, &shell.ObjectStats{CumulativeSize: 5000000}, nil)
fakeManager.StatReturnsOnCall(1, &shell.ObjectStats{CumulativeSize: 5000000}, nil)
fakeManager.StatReturnsOnCall(2, &shell.ObjectStats{CumulativeSize: 5000000}, nil)
fakeManager.StatReturnsOnCall(3, &shell.ObjectStats{CumulativeSize: 5000000}, nil)
fakeManager.RefsReturnsOnCall(0, []string{"QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv", "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"}, nil)
fakeManager.RefsReturnsOnCall(1, []string{"QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv", "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"}, nil)
fakeManager.RefsReturnsOnCall(2, []string{"QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv", "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"}, nil)
fakeManager.RefsReturnsOnCall(3, []string{"QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv", "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"}, nil)
var apiResp apiResponse
urlValues := url.Values{}
urlValues.Add("hold_time", tt.args.holdTime)
urlValues.Add("ipns_path", tt.args.ipnsPath)
if err := sendRequest(
api, "POST", "/v2/ipns/public/pin", tt.wantStatus, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/types.go | api/v2/types.go | package v2
import (
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/kaas/v2"
xss "github.com/dvwright/xss-mw"
pbLens "github.com/RTradeLtd/grpc/lensv2"
pbOrch "github.com/RTradeLtd/grpc/nexus"
pbSigner "github.com/RTradeLtd/grpc/pay"
pbBchWallet "github.com/gcash/bchwallet/rpc/walletrpc"
)
var (
xssMdlwr xss.XssMw
dev = false
devTermsAndServiceURL = "https://gateway.temporal.cloud/ipns/docs.dev.ts.temporal.cloud"
prodTermsAndServiceURL = "https://gateway.temporal.cloud/ipns/docs.ts.temporal.cloud"
alreadyUploadedMessage = "it seems like you have uploaded content matching this hash already. To save your credits, no charge was placed and the call was gracefully aborted. Please contact support@rtradetechnologies.com if you believe this is an issue"
)
// Options is used to non-critical options
type Options struct {
DebugLogging bool
DevMode bool
}
// Clients is used to configure service clients we use
type Clients struct {
Lens pbLens.LensV2Client
Orch pbOrch.ServiceClient
Signer pbSigner.SignerClient
BchWallet pbBchWallet.WalletServiceClient
}
// CreditRefund is a data object to contain refund information
type CreditRefund struct {
Username string
CallType string
Cost float64
}
type queues struct {
pin *queue.Manager
cluster *queue.Manager
email *queue.Manager
ipns *queue.Manager
key *queue.Manager
dash *queue.Manager
eth *queue.Manager
bch *queue.Manager
ens *queue.Manager
}
// kaas key managers
type keys struct {
kb1 *kaas.Client
kb2 *kaas.Client
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_rtfs.go | api/v2/routes_rtfs.go | package v2
import (
"bytes"
"errors"
"html"
"io"
"io/ioutil"
"net/http"
"github.com/c2h5oh/datasize"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/Temporal/utils"
"github.com/RTradeLtd/crypto/v2"
"github.com/RTradeLtd/database/v2/models"
ipfsapi "github.com/RTradeLtd/go-ipfs-api"
"github.com/gin-gonic/gin"
gocid "github.com/ipfs/go-cid"
multihash "github.com/multiformats/go-multihash"
)
// PinHashLocally is used to pin a hash to the local ipfs node
func (api *API) pinHashLocally(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// validate hash
hash := c.Param("hash")
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "hold_time")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// parse hold time
holdTimeInt, err := api.validateHoldTime(username, forms["hold_time"])
if err != nil {
Fail(c, err)
return
}
upload, err := api.upm.FindUploadByHashAndUserAndNetwork(username, hash, "public")
// by this conditional if statement passing, it means the user has
// upload content matching this hash before, and we don't want to charge them
// so we should abort further processing
if err == nil || upload != nil {
Respond(c, http.StatusBadRequest, gin.H{"response": alreadyUploadedMessage})
return
}
// determine cost of upload
cost, size, err := utils.CalculatePinCost(username, hash, holdTimeInt, api.ipfs, api.usage)
if err != nil {
api.LogError(c, err, eh.CostCalculationError)(http.StatusBadRequest)
return
}
// validate, and deduct credits if they can upload
if err := api.validateUserCredits(username, cost); err != nil {
api.LogError(c, err, eh.InvalidBalanceError)(http.StatusPaymentRequired)
return
}
// update their data usage
if err := api.usage.UpdateDataUsage(username, uint64(size)); err != nil {
api.LogError(c, err, eh.CantUploadError)(http.StatusBadRequest)
api.refundUserCredits(username, "pin", cost)
return
}
// construct pin message
qp := queue.IPFSClusterPin{
CID: hash,
NetworkName: "public",
UserName: username,
HoldTimeInMonths: holdTimeInt,
Size: size,
CreditCost: cost,
FileName: c.PostForm("file_name"),
}
// sent pin message
if err = api.queues.cluster.PublishMessage(qp); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
api.refundUserCredits(username, "pin", cost)
api.usage.ReduceDataUsage(username, uint64(size))
return
}
// log success and return
api.l.Infow("ipfs pin request sent to backend", "user", username)
Respond(c, http.StatusOK, gin.H{"response": "pin request sent to backend"})
}
// AddFile is used to add a file to ipfs with optional encryption
func (api *API) addFile(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "hold_time")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// parse hold time
holdTimeInMonthsInt, err := api.validateHoldTime(username, forms["hold_time"])
if err != nil {
Fail(c, err)
return
}
var defaultHash = "sha2-256"
hashType := c.PostForm("hash_type")
if hashType == "" {
hashType = defaultHash
}
if _, ok := multihash.Names[hashType]; !ok {
Fail(c, errors.New("invalid multihash type given in post form hash_type"))
return
}
// fetch the file, and create a handler to interact with it
fileHandler, err := c.FormFile("file")
if err != nil {
Fail(c, err)
return
}
fileName := fileHandler.Filename
// validate the size of upload is within limits
if err := api.FileSizeCheck(fileHandler.Size); err != nil {
Fail(c, err)
return
}
api.l.Debug("opening file")
openFile, err := fileHandler.Open()
if err != nil {
api.LogError(c, err, eh.FileOpenError)(http.StatusBadRequest)
return
}
// we need a small hack because reading from openFile once
// drains it's contents, by holding it in a temporary bytes object
// we can avoid any issues that may be caused
fileBytes, err := ioutil.ReadAll(openFile)
if err != nil {
Fail(c, err)
return
}
hash, err := api.ipfs.Add(bytes.NewReader(fileBytes), ipfsapi.OnlyHash(true), ipfsapi.Hash(hashType))
if err != nil {
api.LogError(c, err, eh.IPFSAddError)(http.StatusBadRequest)
return
}
upload, err := api.upm.FindUploadByHashAndUserAndNetwork(username, hash, "public")
// by this conditional if statement passing, it means the user has
// upload content matching this hash before, and we don't want to charge them
// so we should gracefully abort further processing
if err == nil || upload != nil {
Respond(c, http.StatusOK, gin.H{"response": hash, "notice": alreadyUploadedMessage})
return
}
// format size of file into gigabytes
fileSizeInGB := uint64(fileHandler.Size) / datasize.GB.Bytes()
api.l.Debug("user", username, "file_size_in_gb", fileSizeInGB)
// calculate code of upload
cost, err := utils.CalculateFileCost(username, holdTimeInMonthsInt, fileHandler.Size, api.usage)
if err != nil {
api.LogError(c, err, eh.CostCalculationError)(http.StatusBadRequest)
return
}
// validate they have enough credits to pay for the upload
if err = api.validateUserCredits(username, cost); err != nil {
api.LogError(c, err, eh.InvalidBalanceError)(http.StatusPaymentRequired)
return
}
// update their data usage
if err := api.usage.UpdateDataUsage(username, uint64(fileHandler.Size)); err != nil {
api.LogError(c, err, eh.CantUploadError)(http.StatusBadRequest)
api.refundUserCredits(username, "file", cost)
return
}
var reader io.Reader
// encrypt file is passphrase is given
if c.PostForm("passphrase") != "" {
userUsage, err := api.usage.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
}
// if the user is within the free tier, then we throttle on-demand encryption
// free accounts are limited to a file upload size of 275MB when performing
// on-demand encryption. Non free accounts do not have this limit
if userUsage.Tier == models.Free || userUsage.Tier == models.Unverified {
megabytesUint := datasize.MB.Bytes()
maxSize := megabytesUint * 275
if fileHandler.Size > int64(maxSize) {
Fail(c, errors.New("free accounts are limited to a max file size of 275MB when using on-demand encryption"))
api.refundUserCredits(username, "file", cost)
api.usage.ReduceDataUsage(username, uint64(fileHandler.Size))
return
}
}
// html decode strings
decodedPassPhrase := html.UnescapeString(c.PostForm("passphrase"))
encrypted, err := crypto.NewEncryptManager(decodedPassPhrase).Encrypt(bytes.NewReader(fileBytes))
if err != nil {
api.LogError(c, err, eh.EncryptionError)(http.StatusBadRequest)
api.refundUserCredits(username, "file", cost)
api.usage.ReduceDataUsage(username, uint64(fileHandler.Size))
return
}
reader = bytes.NewReader(encrypted)
// generate an encryption manager and encrypt
} else {
reader = bytes.NewReader(fileBytes)
}
api.l.Debug("adding file...")
resp, err := api.ipfs.Add(reader, ipfsapi.Hash(hashType))
if err != nil {
api.LogError(c, err, eh.IPFSAddError)(http.StatusBadRequest)
api.refundUserCredits(username, "file", cost)
api.usage.ReduceDataUsage(username, uint64(fileHandler.Size))
return
}
// if this was an encrypted upload we need to update the encrypted upload table
// ipfs cluster pin handles updating the regular uploads table
if c.PostForm("passphrase") != "" {
if _, err := api.ue.NewUpload(username, fileHandler.Filename, "public", resp); err != nil {
api.LogError(c, err, eh.DatabaseUpdateError)(http.StatusBadRequest)
// dont refund here as the data is already available on ipfs
return
}
}
api.l.Debug("file uploaded to ipfs")
qp := queue.IPFSClusterPin{
CID: resp,
NetworkName: "public",
UserName: username,
HoldTimeInMonths: holdTimeInMonthsInt,
FileName: fileName,
Size: fileHandler.Size,
}
// send message to rabbitmq
if err = api.queues.cluster.PublishMessage(qp); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("simple ipfs file upload processed", "user", username)
Respond(c, http.StatusOK, gin.H{"response": resp})
}
// IpfsPubSubPublish is used to publish a pubsub msg
func (api *API) ipfsPubSubPublish(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// topic is the topic which the pubsub message will be addressed to
topic := c.Param("topic")
// extract post form
forms, missingField := api.extractPostForms(c, "message")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate they can submit pubsub message calls
if err := api.usage.CanPublishPubSub(username); err != nil {
api.LogError(c, err, "sending a pubsub message will go over your monthly limit")(http.StatusBadRequest)
return
}
// publish the actual message
if err = api.ipfs.PubSubPublish(topic, forms["message"]); err != nil {
api.LogError(c, err, eh.IPFSPubSubPublishError)(http.StatusBadRequest)
return
}
// update pubsub message usage
if err := api.usage.IncrementPubSubUsage(username, 1); err != nil {
api.LogError(c, err, "failed to increment pubsub usage counter")(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("ipfs pub sub message published", "user", username)
Respond(c, http.StatusOK, gin.H{"response": gin.H{"topic": topic, "message": forms["message"]}})
}
// GetObjectStatForIpfs is used to get the object stats for the particular cid
func (api *API) getObjectStatForIpfs(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// hash is the object to retrieve stats for
hash := c.Param("hash")
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
// retrieve stats for the object
stats, err := api.ipfs.Stat(hash)
if err != nil {
api.LogError(c, err, eh.IPFSObjectStatError)
Fail(c, err)
return
}
// log and return
api.l.Infow("ipfs object stat requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": stats})
}
// GetDagObject is used to retrieve an IPLD object from ipfs
func (api *API) getDagObject(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// hash to retrieve dag for
hash := c.Param("hash")
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
var out interface{}
if err := api.ipfs.DagGet(hash, &out); err != nil {
api.LogError(c, err, eh.IPFSDagGetError)(http.StatusBadRequest)
return
}
api.l.Infow("ipfs dag get requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": out})
}
// extendPin is used to extend the lifetime of a pin by a certain number of months
func (api *API) extendPin(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// hash to retrieve dag for
hash := c.Param("hash")
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
// extract needed post forms
forms, missingField := api.extractPostForms(c, "hold_time")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate the hold time
holdTimeInt, err := api.validateHoldTime(username, forms["hold_time"])
if err != nil {
Fail(c, err)
return
}
usg, err := api.usage.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.UserSearchError)
return
}
// find upload
upload, err := api.upm.FindUploadByHashAndUserAndNetwork(username, hash, "public")
if err != nil {
api.LogError(c, err, eh.UploadSearchError)(http.StatusBadRequest)
return
}
// ensure even with pin time extension, it wont breach two year limit
if err := api.ensureLEMaxPinTime(upload, holdTimeInt, usg.Tier); err != nil {
Fail(c, err)
return
}
// calculate cost of hold time extension
cost, _, err := utils.CalculatePinCost(username, hash, holdTimeInt, api.ipfs, api.usage)
if err != nil {
api.LogError(c, err, eh.CostCalculationError)(http.StatusBadRequest)
return
}
// validate they have enough credits
if err := api.validateUserCredits(username, cost); err != nil {
api.LogError(c, err, eh.InvalidBalanceError)(http.StatusPaymentRequired)
return
}
// extend garbage collection period
if err := api.upm.ExtendGarbageCollectionPeriod(username, hash, "public", int(holdTimeInt)); err != nil {
api.LogError(c, err, eh.PinExtendError)(http.StatusBadRequest)
api.refundUserCredits(username, "pin", cost)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": "pin time successfully extended"})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_ens.go | api/v2/routes_ens.go | package v2
import (
"errors"
"net/http"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/database/v2/models"
"github.com/gin-gonic/gin"
gocid "github.com/ipfs/go-cid"
)
// ClaimENSName is used to claim a username based ens subdomain
func (api *API) ClaimENSName(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
usage, err := api.usage.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
}
// prevent processing if account is free tier
if usage.Tier == models.Free || usage.Tier == models.Unverified {
Fail(c, errors.New("free accounts not eligible for ens claim"), http.StatusBadRequest)
return
}
// prevent processing if account is using an already claimed name
if usage.ClaimedENSName {
Fail(c, errors.New("user already claimed ens name"), http.StatusBadRequest)
return
}
if err := api.validateUserCredits(username, 0.45); err != nil {
api.LogError(c, err, eh.InvalidBalanceError)(http.StatusPaymentRequired)
return
}
// mark account as having claimed ens name
if err := api.usage.ClaimENSName(username); err != nil {
api.LogError(c, err, "failed to claim ens name")(http.StatusBadRequest)
api.refundUserCredits(username, "ens", 0.45)
return
}
if err := api.queues.ens.PublishMessage(queue.ENSRequest{
Type: queue.ENSRegisterSubName,
UserName: username,
}); err != nil {
// this fails, unclaim
if err := api.usage.UnclaimENSName(username); err != nil {
api.l.Errorw("failed to unclaim ens name", "user", username, "error", err)
}
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
api.refundUserCredits(username, "ens", 0.45)
return
}
api.l.Infow("ens name claim request sent to backend", "user", username)
Respond(c, http.StatusOK, gin.H{
"response": "request is being processed, you will receive an email with an update when finished",
})
}
// UpdateContentHash is used to update the content hash for an ens name
func (api *API) UpdateContentHash(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
usage, err := api.usage.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
}
// prevent processing if account is free tier
if usage.Tier == models.Free || usage.Tier == models.Unverified {
Fail(c, errors.New("free accounts not eligible for ens claim"), http.StatusBadRequest)
return
}
// prevent processing if name is unclaimed
if !usage.ClaimedENSName {
Fail(c, errors.New("user has not claimed ens name"), http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "content_hash")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate the content is is valid
if _, err := gocid.Decode(forms["content_hash"]); err != nil {
Fail(c, err)
return
}
if err := api.validateUserCredits(username, 0.15); err != nil {
api.LogError(c, err, eh.InvalidBalanceError)(http.StatusPaymentRequired)
return
}
if err := api.queues.ens.PublishMessage(queue.ENSRequest{
Type: queue.ENSUpdateContentHash,
UserName: username,
ContentHash: forms["content_hash"],
}); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
api.refundUserCredits(username, "ens", 0.15)
return
}
api.l.Infow("ens content hash update request sent to backend", "user", username)
Respond(c, http.StatusOK, gin.H{
"response": "request is being processed, you will receive an email with an update when finished",
})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/context_test.go | api/v2/context_test.go | package v2
import (
"net/http"
"testing"
)
func Test_status(t *testing.T) {
type args struct {
i []int
}
tests := []struct {
name string
args args
wantStatus int
}{
{"given code", args{[]int{404}}, 404},
{"not given code", args{[]int{}}, http.StatusBadRequest},
{"given nil", args{nil}, http.StatusBadRequest},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if gotStatus := status(tt.args.i); gotStatus != tt.wantStatus {
t.Errorf("status() = %v, want %v", gotStatus, tt.wantStatus)
}
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_rtfsp_usage.go | api/v2/routes_rtfsp_usage.go | package v2
import (
"bytes"
"errors"
"html"
"io"
"io/ioutil"
"net/http"
"time"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/crypto/v2"
"github.com/RTradeLtd/database/v2/models"
ipfsapi "github.com/RTradeLtd/go-ipfs-api"
"github.com/RTradeLtd/rtfs/v2"
gocid "github.com/ipfs/go-cid"
"github.com/jinzhu/gorm"
"github.com/gin-gonic/gin"
)
// PinToHostedIPFSNetwork is used to pin content to a private ipfs network
func (api *API) pinToHostedIPFSNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get hash to pin
hash := c.Param("hash")
// ensure validity of hash
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "network_name", "hold_time")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// ensure user has access to network
if err = CheckAccessForPrivateNetwork(username, forms["network_name"], api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// parse hold time
holdTimeInt, err := api.validateHoldTime(username, forms["hold_time"])
if err != nil {
Fail(c, err)
return
}
upload, err := api.upm.FindUploadByHashAndUserAndNetwork(username, hash, forms["network_name"])
if err == nil || upload != nil {
Respond(c, http.StatusBadRequest, gin.H{"response": alreadyUploadedMessage})
return
}
// create pin message
ip := queue.IPFSPin{
CID: hash,
NetworkName: forms["network_name"],
UserName: username,
HoldTimeInMonths: holdTimeInt,
CreditCost: 0,
JWT: GetAuthToken(c),
FileName: c.PostForm("file_name"),
}
// send message for processing
if err = api.queues.pin.PublishMessage(ip); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// log and return
api.l.With("user", username).Info("private network pin request sent to backend")
Respond(c, http.StatusOK, gin.H{"response": "content pin request sent to backend"})
}
// AddFileToHostedIPFSNetwork is used to add a file to a private IPFS network via the simple method
func (api *API) addFileToHostedIPFSNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "network_name", "hold_time")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// verify user has access to private network
if err := CheckAccessForPrivateNetwork(username, forms["network_name"], api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)
Fail(c, err)
return
}
// parse hold time
holdTimeInt, err := api.validateHoldTime(username, forms["hold_time"])
if err != nil {
Fail(c, err)
return
}
// fetch the file, and create a handler to interact with it
fileHandler, err := c.FormFile("file")
if err != nil {
// user error, do not log
Fail(c, err)
return
}
fileName := fileHandler.Filename
// validate file size
if err := api.FileSizeCheck(fileHandler.Size); err != nil {
Fail(c, err)
return
}
// open file into memory
file, err := fileHandler.Open()
if err != nil {
api.LogError(c, err, eh.FileOpenError)(http.StatusBadRequest)
return
}
fileBytes, err := ioutil.ReadAll(file)
if err != nil {
Fail(c, err)
return
}
hash, err := api.ipfs.Add(bytes.NewReader(fileBytes), ipfsapi.OnlyHash(true))
if err != nil {
api.LogError(c, err, eh.IPFSAddError)(http.StatusInternalServerError)
return
}
upload, err := api.upm.FindUploadByHashAndUserAndNetwork(username, hash, forms["network_name"])
if err == nil || upload != nil {
Respond(c, http.StatusOK, gin.H{"response": hash, "notice": alreadyUploadedMessage})
return
}
var reader io.Reader
// encrypt file if passphrase is given
if c.PostForm("passphrase") != "" {
// html decode strings
decodedPassPhrase := html.UnescapeString(c.PostForm("passphrase"))
encrypted, err := crypto.NewEncryptManager(decodedPassPhrase).Encrypt(file)
if err != nil {
api.LogError(c, err, eh.EncryptionError)(http.StatusBadRequest)
return
}
reader = bytes.NewReader(encrypted)
} else {
reader = bytes.NewReader(fileBytes)
}
// format a url to connect to for private network
apiURL := api.GetIPFSEndpoint(forms["network_name"])
// connect to private ifps network
ipfsManager, err := rtfs.NewManager(apiURL, GetAuthToken(c), time.Minute*60)
if err != nil {
api.LogError(c, err, eh.IPFSConnectionError)(http.StatusBadRequest)
return
}
// add file to ipfs
resp, err := ipfsManager.Add(reader)
if err != nil {
api.LogError(c, err, eh.IPFSAddError)(http.StatusBadRequest)
return
}
// if this was an encrypted upload we need to update the encrypted upload table
// ipfs cluster pin handles updating the regular uploads table
if c.PostForm("passphrase") != "" {
if _, err := api.ue.NewUpload(username, fileHandler.Filename, "public", resp); err != nil {
api.LogError(c, err, eh.DatabaseUpdateError)(http.StatusBadRequest)
return
}
}
upload, err = api.upm.FindUploadByHashAndUserAndNetwork(
username,
resp,
forms["network_name"],
)
if err != nil && err != gorm.ErrRecordNotFound {
api.LogError(c, err, eh.UploadSearchError)(http.StatusBadRequest)
return
}
if upload == nil {
_, err = api.upm.NewUpload(resp, "file", models.UploadOptions{
NetworkName: forms["network_name"],
Username: username,
HoldTimeInMonths: holdTimeInt,
FileName: fileName,
Size: fileHandler.Size,
})
} else {
_, err = api.upm.UpdateUpload(holdTimeInt, username, resp, forms["network_name"])
}
if err != nil {
api.LogError(c, err, eh.DatabaseUpdateError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("simple private ipfs file upload processed", "user", username)
Respond(c, http.StatusOK, gin.H{"response": resp})
}
// IpfsPubSubPublishToHostedIPFSNetwork is used to publish a pubsub message to a private ipfs network
func (api *API) ipfsPubSubPublishToHostedIPFSNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the topic to publish a message too
topic := c.Param("topic")
// extract post forms
forms, missingField := api.extractPostForms(c, "network_name", "message")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate access to private network
if err := CheckAccessForPrivateNetwork(username, forms["network_name"], api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// format a url to connect too
apiURL := api.GetIPFSEndpoint(forms["network_name"])
// connect to private ipfs network
manager, err := rtfs.NewManager(apiURL, GetAuthToken(c), time.Minute*60)
if err != nil {
api.LogError(c, err, eh.IPFSConnectionError)(http.StatusBadRequest)
return
}
// publish the actual message
if err = manager.PubSubPublish(topic, forms["message"]); err != nil {
api.LogError(c, err, eh.IPFSPubSubPublishError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("private ipfs pub sub message published", "user", username)
Respond(c, http.StatusOK, gin.H{"response": gin.H{"topic": topic, "message": forms["message"]}})
}
// GetObjectStatForIpfsForHostedIPFSNetwork is used to get object stats from a private ipfs network
func (api *API) getObjectStatForIpfsForHostedIPFSNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the hash to retrieve stats for
hash := c.Param("hash")
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
//get the network to connect to
networkName := c.Param("networkName")
// validate access to network
if err := CheckAccessForPrivateNetwork(username, networkName, api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// format a url to connect to
apiURL := api.GetIPFSEndpoint(networkName)
// connect to private ipfs network
manager, err := rtfs.NewManager(apiURL, GetAuthToken(c), time.Minute*60)
if err != nil {
api.LogError(c, err, eh.IPFSConnectionError)(http.StatusBadRequest)
return
}
// get stats for object
stats, err := manager.Stat(hash)
if err != nil {
api.LogError(c, err, eh.IPFSObjectStatError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("private ipfs object stat requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": stats})
}
// CheckLocalNodeForPinForHostedIPFSNetwork is used to check the serving node for a pin
func (api *API) checkLocalNodeForPinForHostedIPFSNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// hash to check pin for
hash := c.Param("hash")
// validate the type of hash
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
// network to connect to
networkName := c.Param("networkName")
// validate access to network
if err := CheckAccessForPrivateNetwork(username, networkName, api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// format a url to connect to
apiURL := api.GetIPFSEndpoint(networkName)
// connect to the actual private network
manager, err := rtfs.NewManager(apiURL, GetAuthToken(c), time.Minute*60)
if err != nil {
api.LogError(c, err, eh.IPFSConnectionError)(http.StatusBadRequest)
return
}
// check node for pin
present, err := manager.CheckPin(hash)
if err != nil {
api.LogError(c, err, eh.IPFSPinParseError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("private ipfs pin check requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": present})
}
// GetDagObject is used to retrieve an IPLD object from ipfs
func (api *API) getDagObjectForHostedIPFSNetwork(c *gin.Context) {
if !dev {
Fail(c, errors.New("private networks not supported in production, please use https://dev.api.temporal.cloud"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the hash to retrieve dag object for
hash := c.Param("hash")
// validate type of hash
if _, err := gocid.Decode(hash); err != nil {
Fail(c, err)
return
}
// get network to connect to
networkName := c.Param("networkName")
// validate the user has access to the private network
if err := CheckAccessForPrivateNetwork(username, networkName, api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// format a url to connect to
apiURL := api.GetIPFSEndpoint(networkName)
// connect to the private ipfs network
im, err := rtfs.NewManager(apiURL, GetAuthToken(c), time.Minute*60)
if err != nil {
api.LogError(c, err, eh.IPFSConnectionError)(http.StatusBadRequest)
return
}
// retrieve the dag object
var out interface{}
if err := im.DagGet(hash, &out); err != nil {
api.LogError(c, err, eh.IPFSDagGetError)(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": out})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/utils.go | api/v2/utils.go | package v2
import (
"bytes"
"errors"
"fmt"
"io/ioutil"
"net/http"
"os"
"strconv"
"time"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/database/v2/models"
gpaginator "github.com/RTradeLtd/gpaginator"
"github.com/RTradeLtd/swampi"
"github.com/c2h5oh/datasize"
"github.com/gin-gonic/gin"
"github.com/jinzhu/gorm"
jwt "gopkg.in/dgrijalva/jwt-go.v3"
)
const (
// RtcCostUsd is the price of a single RTC in USD
RtcCostUsd = 0.125
)
// pageIt is used to serve paginated responses
func (api *API) pageIt(c *gin.Context, db *gorm.DB, model interface{}) {
page := c.Query("page")
if page == "" {
page = "1"
}
limit := c.Query("limit")
if limit == "" {
limit = "10"
}
pageInt, err := strconv.Atoi(page)
if err != nil {
Fail(c, err, http.StatusBadRequest)
return
}
limitInt, err := strconv.Atoi(limit)
if err != nil {
Fail(c, err, http.StatusBadRequest)
return
}
paged, err := gpaginator.Paging(
&gpaginator.Param{
DB: db,
Page: pageInt,
Limit: limitInt,
// sort results starting with newest first
OrderBy: []string{"created_at DESC"},
},
model,
)
if err != nil {
api.LogError(c, err, "failed to get paged user upload "+err.Error())(http.StatusBadRequest)
return
}
Respond(c, http.StatusOK, gin.H{"response": paged})
}
// CheckAccessForPrivateNetwork checks if a user has access to a private network
func CheckAccessForPrivateNetwork(username, networkName string, db *gorm.DB) error {
um := models.NewUserManager(db)
canUpload, err := um.CheckIfUserHasAccessToNetwork(username, networkName)
if err != nil {
return err
}
if !canUpload {
return errors.New("unauthorized access to private network")
}
return nil
}
// GetIPFSEndpoint is used to construct the api url to connect to
// for private ipfs networks. in the case of dev mode it returns
// an default, non nexus based ipfs api address
func (api *API) GetIPFSEndpoint(networkName string) string {
if dev {
return api.cfg.IPFS.APIConnection.Host + ":" + api.cfg.IPFS.APIConnection.Port
}
return api.cfg.Nexus.Host + ":" + api.cfg.Nexus.Delegator.Port + "/network/" + networkName
}
// FileSizeCheck is used to check and validate the size of the uploaded file
func (api *API) FileSizeCheck(size int64) error {
sizeInt, err := strconv.ParseInt(
api.cfg.API.SizeLimitInGigaBytes,
10,
64,
)
if err != nil {
return err
}
gbInt := int64(datasize.GB.Bytes()) * sizeInt
if size > gbInt {
return errors.New(eh.FileTooBigError)
}
return nil
}
// generateEmailJWTToken is used to generate a jwt token used to validate emails
func (api *API) generateEmailJWTToken(username, verificationString string) (string, error) {
// generate a jwt with claims to verify email
verificationJWT := jwt.NewWithClaims(jwt.SigningMethodHS512, jwt.MapClaims{
"user": username,
"emailVerificationString": verificationString,
"expire": time.Now().Add(time.Hour * 24).UTC().String(),
})
// return a signed version of the jwt
return verificationJWT.SignedString([]byte(api.cfg.API.JWT.Key))
}
func (api *API) verifyEmailJWTToken(jwtString, username string) error {
// parse the jwt for a token
token, err := jwt.Parse(jwtString, func(token *jwt.Token) (interface{}, error) {
// Don't forget to validate the alg is what you expect:
if method, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("unable to validate signing method: %v", token.Header["alg"])
} else if method != jwt.SigningMethodHS512 {
return nil, errors.New("expect hs512 signing method")
}
// return byte version of signing key
return []byte(api.cfg.JWT.Key), nil
})
// verify jwt was parsed properly
if err != nil {
return err
}
// verify that the token is valid
if !token.Valid {
return errors.New("failed to validate token")
}
// extract claims from token
claims, ok := token.Claims.(jwt.MapClaims)
if !ok {
return errors.New("failed to parse claims")
}
// verify the username matches what we are expected
if claims["user"] != username {
return fmt.Errorf("username from claim does not match expected user of %s", username)
}
// get user model so we can validate the email verification string
user, err := api.um.FindByUserName(username)
if err != nil {
return errors.New(eh.UserSearchError)
}
emailVerificationString, ok := claims["emailVerificationString"].(string)
if !ok {
return errors.New("failed to convert verification token to string")
}
// validate email verification string
if claims["emailVerificationString"] != user.EmailVerificationToken {
return errors.New("failed to validate email verification token")
}
// ensure we can cast claims["expire"] to string type
expireString, ok := claims["expire"].(string)
if !ok {
return errors.New("failed to convert expire value to string")
}
// parse expire string into time.Time
expireTime, err := time.Parse("2006-01-02 15:04:05.999999999 -0700 MST", expireString)
if err != nil {
return err
}
// validate that the token hasn't expired
if time.Now().UTC().Unix() > expireTime.Unix() {
return errors.New("token is expired")
}
// enable email activity
if _, err := api.um.ValidateEmailVerificationToken(username, emailVerificationString); err != nil {
return err
}
// upgrade to free tier if unverified
usg, err := api.usage.FindByUserName(username)
if err != nil {
return err
}
// only update tier if they are an unverified user
// this is to provide backwards compatability where some unverified users
// may already be in a different tier
if usg.Tier == models.Unverified {
api.usage.UpdateTier(username, models.Free)
}
return nil
}
// validateUserCredits is used to validate whether or not a user has enough credits to pay for an action
// and if they do, it is deducted from their account
func (api *API) validateUserCredits(username string, cost float64) error {
availableCredits, err := api.um.GetCreditsForUser(username)
if err != nil {
return err
}
if availableCredits < cost {
return errors.New(eh.InvalidBalanceError)
}
if _, err := api.um.RemoveCredits(username, cost); err != nil {
return err
}
return nil
}
// refundUserCredits is used to trigger a credit refund for a user, in the event of an API level processing failure.
// Note that we do not do any error handling here, instead we will log the information so that we may manually
// remediate the situation
func (api *API) refundUserCredits(username, callType string, cost float64) {
if _, err := api.um.AddCredits(username, cost); err != nil {
api.l.With("user", username, "call_type", callType, "error", err.Error()).Error(eh.CreditRefundError)
}
}
// validateAdminRequest is used to validate whether or not the requesting user is an administrator
func (api *API) validateAdminRequest(username string) error {
isAdmin, err := api.um.CheckIfAdmin(username)
if err != nil {
return err
}
if !isAdmin {
return errors.New(eh.UnAuthorizedAdminAccess)
}
return nil
}
// used to extract needed post forms that should be provided with api calls.
// if the second return parameter, the string is non-empty, this is the name of the field which was missing
// we then use this to fail with a meaningful message
func (api *API) extractPostForms(c *gin.Context, formNames ...string) (map[string]string, string) {
forms := make(map[string]string)
for _, name := range formNames {
value, exists := c.GetPostForm(name)
if !exists {
return nil, name
}
if value == "" { // prevent empty values counting as valid
return nil, name
}
forms[name] = value
}
return forms, ""
}
// ValidateHoldTime is used to perform parsing of requested hold times,
// returning an int64 type of the provided hold time
func (api *API) validateHoldTime(username, holdTime string) (int64, error) {
var (
// 1 year
freeHoldTimeLimitInMonths int64 = 12
// two years
nonFreeHoldTimeLimitInMonths int64 = 24
)
holdTimeInt, err := strconv.ParseInt(holdTime, 10, 64)
if err != nil {
return 0, err
}
usageTier, err := api.usage.FindByUserName(username)
if err != nil {
return 0, err
}
switch usageTier.Tier {
case models.Free, models.Unverified:
if holdTimeInt > freeHoldTimeLimitInMonths {
return 0, errors.New("free accounts are limited to maximum hold times of 12 month")
}
default:
if holdTimeInt > nonFreeHoldTimeLimitInMonths {
return 0, errors.New("non free accounts are limited to a maximum hold time of 24 months")
}
}
return holdTimeInt, nil
}
func (api *API) ensureLEMaxPinTime(upload *models.Upload, holdTime int64, tier models.DataUsageTier) error {
var limit time.Time
switch tier {
case models.Free, models.Unverified:
limit = time.Now().AddDate(1, 0, 0)
case models.Paid, models.Partner, models.WhiteLabeled:
limit = time.Now().AddDate(2, 0, 0)
default:
return errors.New("invalid usage tier")
}
if upload.GarbageCollectDate.AddDate(0, int(holdTime), 0).After(limit) {
return errors.New(eh.MaxHoldTimeError)
}
return nil
}
func (api *API) getCMCKey() string {
if os.Getenv("CMC_API") != "" {
return os.Getenv("CMC_API")
}
return api.cfg.APIKeys.CoinMarketCap
}
func (api *API) getCaptchaKey() string {
if os.Getenv("RECAPTCHA_KEY") != "" {
return os.Getenv("RECAPTCHA_KEY")
}
return api.cfg.APIKeys.ReCAPTCHA
}
// swarmUpload allows upload a file to multiple swarm backends
// and is a poor mans way of replicating data amongst multiple swarm nodes
func (api *API) swarmUpload(data []byte, isTar bool) (string, error) {
var hashes []string
for _, endpoint := range api.swarmEndpoints {
resp, err := endpoint.Send(swampi.SingleFileUpload, bytes.NewReader(data), map[string][]string{
"content-type": {swampi.SingleFileUpload.ContentType(isTar)},
})
if err != nil {
return "", err
}
responseData, err := ioutil.ReadAll(resp.Body)
if err != nil {
resp.Body.Close()
return "", err
}
hashes = append(hashes, string(responseData))
resp.Body.Close()
}
if len(hashes) == 0 {
return "", errors.New("failed to upload any data")
}
var found = make(map[string]bool)
for i, hash := range hashes {
if i == 0 {
found[hash] = true
}
if !found[hash] {
return "", fmt.Errorf("found mismatching hashes %s", hashes)
}
}
return hashes[0], nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_utils.go | api/v2/routes_utils.go | package v2
import (
"bytes"
"context"
"errors"
"fmt"
"net/http"
"os"
"time"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/crypto/v2"
"github.com/RTradeLtd/database/v2/models"
mnemonics "github.com/RTradeLtd/entropy-mnemonics"
pb "github.com/RTradeLtd/grpc/krab"
"github.com/RTradeLtd/rtfs/v2"
"github.com/RTradeLtd/rtfs/v2/beam"
"github.com/ezzarghili/recaptcha-go"
"github.com/gin-gonic/gin"
gocid "github.com/ipfs/go-cid"
)
// SystemsCheck is a basic check of system integrity
func (api *API) SystemsCheck(c *gin.Context) {
hostname, err := os.Hostname()
if err != nil {
api.LogError(c, err, eh.HostNameNotFoundError)(http.StatusInternalServerError)
return
}
c.Writer.Header().Set("X-API-Hostname", hostname)
Respond(c, http.StatusOK, gin.H{
"version": api.version,
"response": "systems online",
})
}
// BeamContent is used to beam content from one network to another
func (api *API) beamContent(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "source_network", "destination_network", "content_hash")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
var (
source, dest string
net1Conn *rtfs.IpfsManager
)
// validate the network to connect to
if forms["source_network"] == "public" {
source = api.cfg.IPFS.APIConnection.Host + ":" + api.cfg.IPFS.APIConnection.Port
net1Conn, err = rtfs.NewManager(source, "", time.Minute*60)
} else {
// if non public network, validate user has access
if err := CheckAccessForPrivateNetwork(username, forms["source_network"], api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// format a url to connect to
source = api.GetIPFSEndpoint(forms["source_network"])
// connect to the actual network
net1Conn, err = rtfs.NewManager(source, GetAuthToken(c), time.Minute*60)
}
// ensure connection was successful
if err != nil {
api.LogError(c, err, eh.IPFSConnectionError)(http.StatusBadRequest)
return
}
// validate the network to connect to
if forms["destination_network"] == "public" {
dest = api.cfg.IPFS.APIConnection.Host + ":" + api.cfg.IPFS.APIConnection.Port
} else {
// non public network, validate user has access
if err := CheckAccessForPrivateNetwork(username, forms["destination_network"], api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
dest = api.GetIPFSEndpoint(forms["destination_network"])
}
// perform optional encryption of content
if passphrase := c.PostForm("passphrase"); passphrase != "" {
// encrypt the file file
data, err := net1Conn.Cat(forms["content_hash"])
if err != nil {
api.LogError(c, err, eh.IPFSCatError)(http.StatusBadRequest)
return
}
// re-add the encrypted content to the source network
newCid, err := net1Conn.Add(bytes.NewReader(data))
if err != nil {
api.LogError(c, err, eh.IPFSAddError)(http.StatusBadRequest)
return
}
// update the content hash to beam
forms["content_hash"] = newCid
}
// create our dual network connection
laserBeam, err := beam.NewLaser(source, dest, GetAuthToken(c))
if err != nil {
api.LogError(c, err, "failed to initialize laser beam")(http.StatusBadRequest)
return
}
// initiate the content transfer
if err := laserBeam.BeamFromSource(forms["content_hash"]); err != nil {
api.LogError(c, err, "failed to tranfer content")(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": gin.H{"status": "content transferred", "content_hash": forms["content_hash"]}})
}
// ExportKey is used to export an ipfs key as a mnemonic phrase
func (api *API) exportKey(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the key name
keyName := c.Param("name")
// validate user owns key name
if owns, err := api.um.CheckIfKeyOwnedByUser(username, keyName); err != nil {
api.LogError(c, err, eh.KeySearchError)(http.StatusBadRequest)
return
} else if !owns {
api.LogError(c, errors.New(eh.KeyUseError), eh.KeyUseError)(http.StatusBadRequest)
return
}
// get private key from krab keystore
resp, err := api.keys.kb1.GetPrivateKey(context.Background(), &pb.KeyGet{Name: keyName})
if err != nil {
api.LogError(c, err, eh.KeyExportError)(http.StatusBadRequest)
return
}
// convert private key to mnemonic phrase
phrase, err := mnemonics.ToPhrase(resp.PrivateKey, mnemonics.English)
if err != nil {
api.LogError(c, err, eh.KeyExportError)(http.StatusBadRequest)
return
}
// after successful parsing delete key from krab primary
if resp, err := api.keys.kb1.DeletePrivateKey(context.Background(), &pb.KeyDelete{Name: keyName}); err != nil {
api.l.Warnw("failed to delete key from primary krab", "error", err.Error())
} else if resp.Status != "private key deleted" {
api.l.Warnw("bad status from primary krab key delete", "status", resp.Status)
}
// only delete from secondary krab keystore if we arent in dev mode
if !dev {
// after successful parsing delete key from krab fallback
if resp, err := api.keys.kb2.DeletePrivateKey(context.Background(), &pb.KeyDelete{Name: keyName}); err != nil {
api.l.Warnw("failed to delete key from backup krab", "error", err.Error())
} else if resp.Status != "private key deleted" {
api.l.Warnw("bad status from backup krab key delete", "status", resp.Status)
}
}
// get key id from database
keyID, err := api.um.GetKeyIDByName(username, keyName)
if err != nil {
api.LogError(c, err, eh.KeySearchError)(http.StatusBadRequest)
return
}
// remove key id from database
if err := api.um.RemoveIPFSKeyForUser(username, keyName, keyID); err != nil {
api.LogError(c, err, "failed to remove key from database")(http.StatusBadRequest)
return
}
// decrease key count
if err := api.usage.ReduceKeyCount(username, 1); err != nil {
api.LogError(c, err, "failed to decrease key count")(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": phrase})
}
// downloadContentHash is used to download content from a private ipfs network
func (api *API) downloadContentHash(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get the content hash that is to be downloaded
contentHash := c.Param("hash")
// ensure it's a valid content hash
if _, err := gocid.Decode(contentHash); err != nil {
Fail(c, err)
return
}
// get the network name, default to public if not specified
networkName := c.PostForm("network_name")
var manager rtfs.Manager
if networkName == "" {
networkName = "public"
manager = api.ipfs
} else if networkName != "public" {
// validate user access to network
if err := CheckAccessForPrivateNetwork(username, networkName, api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
// retrieve api url
apiURL := api.GetIPFSEndpoint(networkName)
// initialize our connection to IPFS
manager, err = rtfs.NewManager(apiURL, GetAuthToken(c), time.Minute*60)
if err != nil {
api.LogError(c, err, eh.IPFSConnectionError)(http.StatusBadRequest)
return
}
}
// fetch the specified content type from the user
contentType := c.PostForm("content_type")
// if not specified, provide a default
if contentType == "" {
contentType = "application/octet-stream"
}
// get any extra headers the user might want
exHeaders := c.PostFormArray("extra_headers")
// read the contents of the file
contents, err := manager.Cat(contentHash)
if err != nil {
api.LogError(c, err, eh.IPFSCatError)(http.StatusBadRequest)
return
}
reader := bytes.NewReader(contents)
size := len(contents)
// decrypt Temporal-encrypted content if key is provided
decryptKey := c.PostForm("decrypt_key")
if decryptKey != "" {
decrypted, err := crypto.NewEncryptManager(decryptKey).Decrypt(reader)
if err != nil {
Fail(c, err)
return
}
size = len(decrypted)
reader = bytes.NewReader(decrypted)
}
// parse extra headers if there are any
extraHeaders := make(map[string]string)
// only process if there is actual data to process
if len(exHeaders) > 0 {
// the array must be of equal length, as a header has two parts
// the name of the header, and its value
if len(exHeaders)%2 != 0 {
FailWithMessage(c, "extra_headers post form is not even in length")
return
}
// parse through the available headers
for i := 0; i < len(exHeaders); i += 2 {
if i+1 < len(exHeaders) {
header := exHeaders[i]
value := exHeaders[i+1]
extraHeaders[header] = value
}
}
}
api.l.Infow("ipfs content download served", "user", username)
c.DataFromReader(200, int64(size), contentType, reader, extraHeaders)
}
func (api *API) handleUserCreate(c *gin.Context, forms map[string]string, createErr error) {
if createErr != nil {
switch createErr.Error() {
case eh.DuplicateEmailError:
api.LogError(
c,
createErr,
eh.DuplicateEmailError,
"email",
forms["email_address"])(http.StatusBadRequest)
return
case eh.DuplicateUserNameError:
api.LogError(
c,
createErr,
eh.DuplicateUserNameError,
"username",
forms["username"])(http.StatusBadRequest)
return
default:
api.LogError(
c,
createErr,
eh.UserAccountCreationError)(http.StatusBadRequest)
return
}
}
// generate a random token to validate email
user, err := api.um.GenerateEmailVerificationToken(forms["username"])
if err != nil {
api.LogError(c, err, eh.EmailTokenGenerationError)(http.StatusBadRequest)
return
}
// generate a jwt used to trigger email validation
token, err := api.generateEmailJWTToken(user.UserName, user.EmailVerificationToken)
if err != nil {
api.LogError(c, err, "failed to generate email verification jwt")
return
}
var url string
// format the url the user clicks to activate email
if dev {
url = fmt.Sprintf(
"https://dev.api.temporal.cloud/v2/account/email/verify/%s/%s",
user.UserName, token,
)
} else {
url = fmt.Sprintf(
"https://api.temporal.cloud/v2/account/email/verify/%s/%s",
user.UserName, token,
)
}
// format a link tag
link := fmt.Sprintf("<a href=\"%s\">link</a>", url)
emailSubject := fmt.Sprintf(
"%s Welcome To Temporal 🌌 Read This For Crucial Getting Started Tips", forms["organization_name"],
)
// build email message
es := queue.EmailSend{
Subject: emailSubject,
Content: fmt.Sprintf(
"%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s",
"Thanks for signing up with Temporal, before you get started it's important we discuss our pinning system.\n",
"When uploading to Temporal you must specify a \"hold time\" which tells our system how long your data should be around for.\n",
"When you're using Temporal via the playground, or the API directly you can configure this for up to 24 months with paid accounts, and up to 12 months for free accounts.\n",
"Temporal’s free tier offers 3GB of storage on the house, paid tier rates are just $0.07/GB and partner tier rates are $0.05/GB.\n",
"<br>",
"<br>",
"When using Temporal through third-party implementations like our IPFS HTTP API reverse proxy, or the ENS management app, we use a default hold time of 12 months for free users and 1 month for paid users.\n",
"We use 1 month for paid users because being in the paid tier means you have to pay for the data consumption and we don't want to overcharge paid users.\n",
"For example if you used the ENS management app to upload your website, and want it to stick around for longer than the default duration you need to extend the pin.\n",
"Pin extension can be done via the <a href=\"https://play2.temporal.cloud\">Temporal Playground</a> or via the API.\n",
"<br>",
"<br>",
"Lastly let's talk about emails! We try our best to not spam your inbox, so we limit emails to a few things: payment notifications, pin expiration warnings, password/username retrieval and processing failures.\n",
"But before we do this, you must validate your email. Additionally before validating your email, you are in the 'unverified' tier which is limited to 100MB of data consumption. Email verification is now mandatory\n",
"To validate your email, just click the following "+link+"\n",
"<br>",
"<br>",
"Questions, comments, concerns, or just feeling talkative? Join us on Telegram where you can receive live support and updates: <a href=\"https://t.me/RTradeTEMPORAL\">click here</a>\n",
"<br>",
"<br>",
"Thanks for signing up!",
),
ContentType: "text/html",
UserNames: []string{user.UserName},
Emails: []string{user.EmailAddress},
}
// send email message to queue for processing
if err = api.queues.email.PublishMessage(es); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// remove hashed password from output
user.HashedPassword = "scrubbed"
// remove the verification token from output
user.EmailVerificationToken = "scrubbed"
// format a custom response that includes the user model
// and an additional status field
var status string
if dev {
status = fmt.Sprintf(
"by continuing to use this service you agree to be bound by the following api terms and service %s",
devTermsAndServiceURL,
)
} else {
status = fmt.Sprintf(
"by continuing to use this service you agree to be bound by the following api terms and service %s",
prodTermsAndServiceURL,
)
}
// return
Respond(c, http.StatusOK, gin.H{"response": struct {
*models.User
Status string
}{
user, status,
},
})
}
func (api *API) verifyCaptcha(c *gin.Context) {
err := api.captcha.VerifyWithOptions(
c.PostForm("g-recaptcha-response"),
// require a threshold of 0.8, default is 0.5
recaptcha.VerifyOption{Threshold: 0.8},
)
if err != nil {
Fail(c, errors.New("captcha validation failed"))
}
Respond(c, http.StatusOK, gin.H{"response": "captcha validation succeeded"})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_ens_test.go | api/v2/routes_ens_test.go | package v2
import (
"net/url"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
)
func Test_API_Routes_ENS(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
// instantiate the test api
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// test update content hash (fail, unclaimed)
var resp interface{}
urlValues := url.Values{}
urlValues.Add("content_hash", hash)
if err := sendRequest(
api, "POST", "/v2/ens/update", 400, nil, urlValues, &resp,
); err != nil {
t.Fatal(err)
}
// test claiming name (200)
if err := sendRequest(
api, "POST", "/v2/ens/claim", 200, nil, nil, &resp,
); err != nil {
t.Fatal(err)
}
// test updating content hash (200)
urlValues = url.Values{}
urlValues.Add("content_hash", hash)
if err := sendRequest(
api, "POST", "/v2/ens/update", 200, nil, urlValues, &resp,
); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/api_test.go | api/v2/api_test.go | package v2
import (
"context"
"encoding/json"
"fmt"
"io"
"io/ioutil"
"net/http"
"net/http/httptest"
"net/url"
"strings"
"testing"
"time"
"go.uber.org/zap/zaptest"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/Temporal/rtfscluster"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2"
"github.com/RTradeLtd/database/v2/models"
"github.com/RTradeLtd/rtfs/v2"
"github.com/c2h5oh/datasize"
"github.com/gin-gonic/gin"
"github.com/jinzhu/gorm"
"github.com/streadway/amqp"
)
const (
tooManyCredits = 10.9999997e+07
testUser = "testuser"
testSwarmKey = "7fcb5a1b19bdda69da7307162e3becd2d6bd485d5aad778470b305f3f306cf79"
testBootstrapPeer1 = "/ip4/172.218.49.115/tcp/5002/ipfs/Qmf964tiE9JaxqntDsSBGasD4aaofPQtfYZyMSJJkRrVTQ"
testBootstrapPeer2 = "/ip4/192.168.1.249/tcp/4001/ipfs/QmXuGVPzEz2Ji7g54AYyqoobRJNHqtnrfaEceAes2bTKMh"
testPIN = "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"
testPIN2 = "QmUNLLsPACCz1vLxQVkXqqLX5R1X345qqfHbsf67hvA3Nn"
)
var (
hash = "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"
authHeader string
)
type apiResponse struct {
Code int `json:"code"`
Response string `json:"response"`
}
type loginResponse struct {
Expire string `json:"expire"`
Token string `json:"token"`
}
type boolAPIResponse struct {
Code int `json:"code"`
Response bool `json:"bool"`
}
type mapAPIResponse struct {
Code int `json:"code"`
Response gin.H `json:"response"`
}
type interfaceAPIResponse struct {
Code int `json:"code"`
Response interface{} `json:"response"`
}
type floatAPIResponse struct {
Code int `json:"code"`
Response float64 `json:"response"`
}
type stringSliceAPIResponse struct {
Code int `json:"code"`
Response []string `json:"response"`
}
type searchAPIResponse struct {
Code int `json:"code"`
Response []models.Upload `json:"response"`
}
// sendRequestPaged is a helper method used to handle sending an api request with paged responses
// If `out` is not nil, the response from the API will be unmarshaled into `out`.
func sendRequestPaged(
api *API,
method, url string,
wantStatus int,
body io.Reader,
urlValues url.Values,
out interface{},
) error {
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest(method, url, body)
req.Header.Add("Authorization", authHeader)
for k, v := range urlValues {
for _, kv := range v {
req.URL.Query().Add(k, kv)
}
}
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Code != wantStatus {
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
api.l.Error(err)
}
fmt.Printf("reason for failure: %+v\n", string(bodyBytes))
return fmt.Errorf("received status %v expected %v from api call %s", testRecorder.Code, wantStatus, url)
}
if out == nil {
return nil
}
// unmarshal the response
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
return err
}
return json.Unmarshal(bodyBytes, out)
}
// sendRequest is a helper method used to handle sending an api request
// If `out` is not nil, the response from the API will be unmarshaled into `out`.
func sendRequest(api *API, method, url string, wantStatus int, body io.Reader, urlValues url.Values, out interface{}) error {
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest(method, url, body)
req.Header.Add("Authorization", authHeader)
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Code != wantStatus {
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
api.l.Error(err)
}
fmt.Printf("reason for failure: %+v\n", string(bodyBytes))
return fmt.Errorf("received status %v expected %v from api call %s", testRecorder.Code, wantStatus, url)
}
if out == nil {
return nil
}
// unmarshal the response
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
return err
}
return json.Unmarshal(bodyBytes, out)
}
func setupAPI(t *testing.T, fakeLens *mocks.FakeLensV2Client, fakeOrch *mocks.FakeServiceClient, fakeSigner *mocks.FakeSignerClient, fakeBchWallet *mocks.FakeWalletServiceClient, cfg *config.TemporalConfig, db *gorm.DB) (*API, error) {
dev = true
// setup connection to ipfs-node-1
im, err := rtfs.NewManager(
cfg.IPFS.APIConnection.Host+":"+cfg.IPFS.APIConnection.Port,
"", time.Minute*60,
)
if err != nil {
return nil, err
}
imCluster, err := rtfscluster.Initialize(
context.Background(),
cfg.IPFSCluster.APIConnection.Host,
cfg.IPFSCluster.APIConnection.Port,
)
if err != nil {
return nil, err
}
// create our test api
testRecorder := httptest.NewRecorder()
_, engine := gin.CreateTestContext(testRecorder)
logger := zaptest.NewLogger(t).Sugar()
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
BchWallet: fakeBchWallet,
}
api, err := new(cfg, engine, logger, clients, im, imCluster, false)
if err != nil {
return nil, err
}
// setup api routes
if err = api.setupRoutes(true); err != nil {
return nil, err
}
return api, nil
}
// this does a quick initial test of the API, and setups a second user account to use for testing
func Test_API_Setup(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
type args struct {
method string
call string
username string
password string
email string
}
// register calls
tests := []struct {
name string
args args
wantCode int
}{
{"Register-testuser2", args{"POST", "/v2/auth/register", "testuser2", "password123!@#$%^&&**(!@#!", "testuser@example.org"}, 200},
{"Register-Email-Fail", args{"POST", "/v2/auth/register", "testuer3", "password123", "testuser+test22@example.org"}, 400},
{"Register-DuplicateUser", args{"POST", "/v2/auth/register", "testuser2", "password123", "testuser+user22example.org"}, 400},
{"Register-DuplicateEmail", args{"POST", "/v2/auth/register", "testuser333", "password123", "testuser@example.org"}, 400},
{"Register-BadUserName", args{"POST", "/v2/auth/register", "testuser333@", "password123", "testusernotafailure@example.org"}, 400},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// register user account
// /v2/auth/register
var interfaceAPIResp interfaceAPIResponse
urlValues := url.Values{}
urlValues.Add("username", tt.args.username)
urlValues.Add("password", tt.args.password)
urlValues.Add("email_address", tt.args.email)
if err := sendRequest(
api, "POST", "/v2/auth/register", tt.wantCode, nil, urlValues, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if interfaceAPIResp.Code != tt.wantCode {
t.Fatalf("bad api status code from %s", tt.args.call)
}
})
}
// login calls
tests = []struct {
name string
args args
wantCode int
}{
// this test should fail due to invalid email
{"Login-testuser2", args{"POST", "/v2/auth/login", "testuser2", "password123!@#$%^&&**(!@#!", ""}, 401},
{"Login-testuser", args{"POST", "/v2/auth/login", "testuser", "admin", ""}, 200},
// tests login via the email instead of using
{"Login-TestUser-Email", args{"POST", "/v2/auth/login", "test@email.com", "admin", ""}, 200},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest(
tt.args.method,
tt.args.call,
strings.NewReader(fmt.Sprintf("{\n \"username\": \"%s\",\n \"password\": \"%s\"\n}", tt.args.username, tt.args.password)),
)
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Code != tt.wantCode {
t.Fatalf("bad http status code from %s. got %v, want %v", tt.args.call, testRecorder.Code, tt.wantCode)
}
bodBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
t.Fatal(err)
}
// if we're logging in with the account used for testing the v2 api, update our authorization header
if tt.args.username == "testuser" || tt.args.email == "test@email.com" {
var loginResp loginResponse
if err = json.Unmarshal(bodBytes, &loginResp); err != nil {
t.Fatal(err)
}
authHeader = "Bearer " + loginResp.Token
}
})
}
if str := api.GetIPFSEndpoint("networkName"); str == "" {
t.Fatal("failed to construct api endpoint")
}
}
func Test_API_Routes_Misc(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// test systems check route
// //v2/systems/check
var apiResp apiResponse
if err := sendRequest(
api, "GET", "/v2/systems/check", 200, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/systems/check")
}
if apiResp.Response != "systems online" {
t.Fatal("bad system status recovered")
}
// test systems statistics
// /v2/statistics/stats
if err := sendRequest(
api, "GET", "/v2/statistics/stats", 200, nil, nil, nil,
); err != nil {
t.Fatal(err)
}
// test token refresh
// /v2/auth/refresh
if err := sendRequest(
api, "GET", "/v2/auth/refresh", 200, nil, nil, nil,
); err != nil {
t.Fatal(err)
}
}
func Test_Utils(t *testing.T) {
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
clients := Clients{
Lens: &mocks.FakeLensV2Client{},
Orch: &mocks.FakeServiceClient{},
Signer: &mocks.FakeSignerClient{},
}
api, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger)
if err != nil {
t.Fatal(err)
}
if err := api.FileSizeCheck(int64(datasize.GB.Bytes() * 1)); err != nil {
t.Fatal(err)
}
if err := api.FileSizeCheck(int64(datasize.GB.Bytes() * 1)); err != nil {
t.Fatal(err)
}
if err := api.FileSizeCheck(int64(datasize.GB.Bytes() * 10)); err == nil {
t.Fatal("error expected")
}
type args struct {
paymentType string
blockchain string
}
tests := []struct {
name string
args args
wantErr bool
}{
{"ETHFail", args{"ETH", "ETH"}, true},
{"ETHPass", args{"eth", "ethereum"}, false},
{"RTCFail", args{"RTC", "bitcoinz"}, true},
{"RTCPass", args{"rtc", "ethereum"}, false},
{"BTCFail", args{"BTC", "BTC"}, true},
{"BTCPass", args{"btc", "bitcoin"}, false},
{"LTCFail", args{"LTC", "LTC"}, true},
{"LTCPass", args{"ltc", "litecoin"}, false},
{"XMRFail", args{"XMR", "XMR"}, true},
{"XMRPass", args{"xmr", "monero"}, false},
{"DASHFail", args{"DASH", "DASH"}, true},
{"DASHPass", args{"dash", "dash"}, false},
{"BitcoinCashPass", args{"bch", "bitcoin-cash"}, false},
{"BitcoinCashFail", args{"bhc", "bticoin-csah"}, true},
{"InvalidCoinFail", args{"biiiitcoooonnneeeeeeecccct", "biiiitcoooonnneeeeeeecccct"}, true},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if _, err := api.getUSDValue(tt.args.paymentType); (err != nil) != tt.wantErr {
t.Errorf("getUSDValue() error = %v, wantErr %v", err, tt.wantErr)
}
})
}
if err := api.validateUserCredits(testUser, 1); err != nil {
t.Fatal(err)
}
if err := api.validateUserCredits(testUser, tooManyCredits); err == nil {
t.Fatal("error expected")
}
if err := api.validateAdminRequest(testUser); err != nil {
t.Fatal(err)
}
if err := api.validateAdminRequest("notareallaccount"); err == nil {
t.Fatal("error expected")
}
user, err := api.um.FindByUserName(testUser)
if err != nil {
t.Fatal(err)
}
previousCreditAmount := user.Credits
api.refundUserCredits(testUser, "ipfs-pin", 10)
user, err = api.um.FindByUserName(testUser)
if err != nil {
t.Fatal(err)
}
if user.Credits != previousCreditAmount+10 {
t.Fatal("failed to refund credits")
}
recorder := httptest.NewRecorder()
testCtx, _ := gin.CreateTestContext(recorder)
urlValues := url.Values{}
urlValues.Add("suchkey", "muchvalue")
testCtx.Request = &http.Request{PostForm: urlValues}
forms, missingField := api.extractPostForms(testCtx, "suchkey")
if missingField != "" {
t.Fatal("failed to extract post forms")
}
if forms["suchkey"] != "muchvalue" {
t.Fatal("failed to extract proper postform")
}
}
func Test_API_Initialize_Cluster_Failure(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
// setup an unreachable cluster host
cfg.IPFSCluster.APIConnection.Host = "10.255.255.255"
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
if _, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger); err == nil {
t.Fatal("expected error")
}
}
func Test_API_Initialize_IPFS_Failure(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
// setup an unreachable cluster host
cfg.IPFS.APIConnection.Host = "notarealip"
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
if _, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger); err == nil {
t.Fatal("expected error")
}
}
func Test_API_Initialize_Setup_Routes_Failure(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
// setup an invalid connection limit
cfg.API.Connection.Limit = "notanumber"
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
if _, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger); err == nil {
t.Fatal("expected error")
}
}
func Test_API_Initialize_Kaas_Failure(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
// setup an invalid connection limit
cfg.Services.Krab.TLS.CertPath = "/root"
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
if _, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger); err == nil {
t.Fatal("expected error")
}
}
func Test_API_Initialize_Queue_Failure(t *testing.T) {
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
cfg.RabbitMQ.URL = "notarealip"
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
if _, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger); err == nil {
t.Fatal("expected error")
}
}
func Test_API_Initialize_Main_Network(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
dev = false
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
api, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger)
if err != nil {
t.Fatal(err)
}
api.Close()
}
func Test_API_Initialize_ListenAndServe(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
type args struct {
certFilePath string
keyFilePath string
}
tests := []struct {
name string
args args
wantErr bool
}{
{"NoTLS", args{"", ""}, false},
{"TLS", args{"../../testenv/certs/api.cert", "../../testenv/certs/api.key"}, false},
{"TLS-Missing-Cert", args{"../../README.md", "../../testenv/certs/api.key"}, true},
{"TLS-Missing-Key", args{"../../testenv/certs/api.cert", "../../README.md"}, true},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
logger := zaptest.NewLogger(t).Sugar()
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
api, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger)
if err != nil {
t.Fatal(err)
}
ctx, cancel := context.WithTimeout(context.Background(), time.Second*2)
defer cancel()
defer api.Close()
if tt.args.certFilePath != "" {
err = api.ListenAndServe(ctx, "127.0.0.1:6700", &TLSConfig{tt.args.certFilePath, tt.args.keyFilePath})
} else {
err = api.ListenAndServe(ctx, "127.0.0.1:6701", nil)
}
if (err != nil) != tt.wantErr {
t.Fatalf("ListenAndServer() error = %v, wantErr %v", err, tt.wantErr)
}
})
}
}
func TestAPI_HandleQueuError_Success(t *testing.T) {
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
api, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger)
if err != nil {
t.Fatal(err)
}
go func() {
if err := api.ListenAndServe(context.Background(), "127.0.0.1:6799", &TLSConfig{"../../testenv/certs/api.cert", "../../testenv/certs/api.key"}); err != nil && err != http.ErrServerClosed {
t.Error(err)
}
}()
type args struct {
queueType queue.Queue
}
tests := []struct {
name string
args args
}{
{queue.IpfsClusterPinQueue.String(), args{queue.IpfsClusterPinQueue}},
{queue.EmailSendQueue.String(), args{queue.EmailSendQueue}},
{queue.IpnsEntryQueue.String(), args{queue.IpnsEntryQueue}},
{queue.IpfsPinQueue.String(), args{queue.IpfsPinQueue}},
{queue.IpfsKeyCreationQueue.String(), args{queue.IpfsKeyCreationQueue}},
{queue.DashPaymentConfirmationQueue.String(), args{queue.DashPaymentConfirmationQueue}},
{queue.EthPaymentConfirmationQueue.String(), args{queue.EthPaymentConfirmationQueue}},
{queue.BitcoinCashPaymentConfirmationQueue.String(), args{queue.BitcoinCashPaymentConfirmationQueue}},
}
// declare an error to use for testing
amqpErr := &amqp.Error{Code: 400, Reason: "test", Server: true, Recover: false}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// test ListenAndServe queue function handling
switch tt.args.queueType {
case queue.IpfsClusterPinQueue:
api.queues.cluster.ErrCh <- amqpErr
case queue.EmailSendQueue:
api.queues.email.ErrCh <- amqpErr
case queue.IpnsEntryQueue:
api.queues.ipns.ErrCh <- amqpErr
case queue.IpfsPinQueue:
api.queues.pin.ErrCh <- amqpErr
case queue.IpfsKeyCreationQueue:
api.queues.key.ErrCh <- amqpErr
case queue.DashPaymentConfirmationQueue:
api.queues.dash.ErrCh <- amqpErr
case queue.EthPaymentConfirmationQueue:
api.queues.eth.ErrCh <- amqpErr
case queue.BitcoinCashPaymentConfirmationQueue:
api.queues.bch.ErrCh <- amqpErr
}
// test handleQueueError function directly
if _, err := api.handleQueueError(amqpErr, api.cfg.RabbitMQ.URL, tt.args.queueType, true); err != nil {
t.Fatal(err)
}
})
}
}
func TestAPI_HandleQueuError_Failure(t *testing.T) {
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
clients := Clients{
Lens: fakeLens,
Orch: fakeOrch,
Signer: fakeSigner,
}
api, err := Initialize(context.Background(), cfg, "", Options{DevMode: true, DebugLogging: true}, clients, logger)
if err != nil {
t.Fatal(err)
}
type args struct {
queueType queue.Queue
}
tests := []struct {
name string
args args
}{
{queue.IpfsClusterPinQueue.String(), args{queue.IpfsClusterPinQueue}},
{queue.EmailSendQueue.String(), args{queue.EmailSendQueue}},
{queue.IpnsEntryQueue.String(), args{queue.IpnsEntryQueue}},
{queue.IpfsPinQueue.String(), args{queue.IpfsPinQueue}},
{queue.IpfsKeyCreationQueue.String(), args{queue.IpfsKeyCreationQueue}},
{queue.DashPaymentConfirmationQueue.String(), args{queue.DashPaymentConfirmationQueue}},
{queue.EthPaymentConfirmationQueue.String(), args{queue.EthPaymentConfirmationQueue}},
{queue.BitcoinCashPaymentConfirmationQueue.String(), args{queue.BitcoinCashPaymentConfirmationQueue}},
}
// setup a bad rabbitmq url for testing connectivity failures
api.cfg.RabbitMQ.URL = "notarealprotocol://notarealurl"
// declare an error to use for testing
amqpErr := &amqp.Error{Code: 400, Reason: "test", Server: true, Recover: false}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
//TODO: enable this kind of testing within ListenAndServe eventually
// test handleQueueError function directly
if _, err := api.handleQueueError(amqpErr, api.cfg.RabbitMQ.URL, tt.args.queueType, true); err == nil {
t.Fatal("error expected")
}
})
}
}
func loadDatabase(cfg *config.TemporalConfig) (*gorm.DB, error) {
dbm, err := database.New(cfg, database.Options{SSLModeDisable: true})
if err != nil {
return nil, err
}
return dbm.DB, nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_account.go | api/v2/routes_account.go | package v2
import (
"errors"
"fmt"
"html"
"net/http"
"strconv"
"strings"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/queue"
"github.com/RTradeLtd/database/v2/models"
"github.com/gin-gonic/gin"
)
// getUserFromToken is used to get the username of the associated token
func (api *API) getUserFromToken(c *gin.Context) {
// get username from jwt
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// return username
Respond(c, http.StatusOK, gin.H{"response": username})
}
// verifyEmailAddress is used to verify a users email
// without requiring authentication
func (api *API) verifyEmailAddress(c *gin.Context) {
// get username
user := c.Param("user")
// get the token
token := c.Param("token")
if err := api.verifyEmailJWTToken(token, user); err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
// log and return
Respond(c, http.StatusOK, gin.H{"response": "email verified"})
}
// ChangeAccountPassword is used to change a users password
func (api *API) changeAccountPassword(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract post forms
forms, missingField := api.extractPostForms(c, "old_password", "new_password")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// parse html encoded strings
forms["old_password"] = html.UnescapeString(forms["old_password"])
forms["new_password"] = html.UnescapeString(forms["new_password"])
api.l.With("user", username).Info("password change requested")
// change password
if ok, err := api.um.ChangePassword(username, forms["old_password"], forms["new_password"]); err != nil {
api.LogError(c, err, eh.PasswordChangeError)(http.StatusBadRequest)
return
} else if !ok {
err = fmt.Errorf("password changed failed for user %s to due an unspecified error", username)
api.LogError(c, err, eh.PasswordChangeError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("password changed",
"user", username)
Respond(c, http.StatusOK, gin.H{"response": "password changed"})
}
// RegisterUserAccount is used to sign up with temporal
func (api *API) registerUserAccount(c *gin.Context) {
// extract post forms
forms, missingField := api.extractPostForms(c, "username", "password", "email_address")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// parse emails to prevent exploit of catch-all routing
// where people sign up with an email like myuser+test@example.org
// by having the +test they are effectively signing up under a new email
// granting them another free account.
if strings.ContainsRune(forms["email_address"], '+') {
Fail(c, errors.New("emails must not contain + signs, this is to prevent abuse of catch all routing"))
return
}
// prevent people from registering usernames that contain an `@` sign
// this prevents griefing by prevent user sign-ins by using a username
// that is based off an email address
if strings.ContainsRune(forms["username"], '@') {
Fail(c, errors.New("usernames cant contain @ sign"))
return
}
// parse html encoded strings
forms["password"] = html.UnescapeString(forms["password"])
// create user model
_, err := api.um.NewUserAccount(
forms["username"],
forms["password"],
forms["email_address"],
)
api.handleUserCreate(c, forms, err)
}
// CreateIPFSKey is used to create an IPFS key
func (api *API) createIPFSKey(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// extract forms
forms, missingField := api.extractPostForms(c, "key_type", "key_bits", "key_name")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// validate key type
switch forms["key_type"] {
case "rsa", "ed25519":
break
default:
// user error, do not log
err := fmt.Errorf("%s is invalid key type must be rsa, or ed25519", forms["key_type"])
Fail(c, err, http.StatusBadRequest)
return
}
// get a list of users current keys
keys, err := api.um.GetKeysForUser(username)
if err != nil {
api.LogError(c, err, eh.KeySearchError)(http.StatusNotFound)
return
}
// format key name
// we prepend with the username to prevent key name collisions
keyName := fmt.Sprintf("%s-%s", username, forms["key_name"])
// parse through existing key names, and ensure one doesnt' already exist
for _, v := range keys["key_names"] {
if v == keyName {
err = fmt.Errorf("key with name already exists")
api.LogError(c, err, eh.DuplicateKeyCreationError)(http.StatusConflict)
return
}
}
// parse key bits
bitsInt, err := strconv.Atoi(forms["key_bits"])
if err != nil {
Fail(c, err)
return
}
// verify the user can create keys
if err := api.usage.CanCreateKey(username); err != nil {
api.LogError(c, err, err.Error())(http.StatusBadRequest)
return
}
// increment their key count
if err := api.usage.IncrementKeyCount(username, 1); err != nil {
api.LogError(c, err, "failed to increment key count")(http.StatusBadRequest)
return
}
// create key creation message
key := queue.IPFSKeyCreation{
UserName: username,
Name: keyName,
Type: forms["key_type"],
Size: bitsInt,
NetworkName: "public",
}
// send message for processing
if err = api.queues.key.PublishMessage(key); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// log and return
api.l.With("user", username).Info("key creation request sent to backend")
Respond(c, http.StatusOK, gin.H{"response": "key creation sent to backend"})
}
// GetIPFSKeyNamesForAuthUser is used to get the keys a user has setup
func (api *API) getIPFSKeyNamesForAuthUser(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// search for keys created by user
keys, err := api.um.GetKeysForUser(username)
if err != nil {
api.LogError(c, err, eh.KeySearchError)(http.StatusBadRequest)
return
}
// if the user has no keys, fail with an error
if len(keys["key_names"]) == 0 || len(keys["key_ids"]) == 0 {
Fail(c, errors.New(eh.NoKeyError), http.StatusNotFound)
return
}
// log and return
api.l.Infow("key name list requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": gin.H{"key_names": keys["key_names"], "key_ids": keys["key_ids"]}})
}
// GetCredits is used to get a users available credits
func (api *API) getCredits(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get credits tied with the user account
credits, err := api.um.GetCreditsForUser(username)
if err != nil {
api.LogError(c, err, eh.CreditCheckError)(http.StatusBadRequest)
return
}
// log and return
api.l.Infow("credit check requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": credits})
}
// ForgotEmail is used to retrieve an email if the user forgets it
func (api *API) forgotEmail(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// search for the user
user, err := api.um.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
}
// return email address associated with the user account
Respond(c, http.StatusOK, gin.H{"response": user.EmailAddress})
}
// ForgotUserName is used to send a username reminder to the email associated with the account
func (api *API) forgotUserName(c *gin.Context) {
forms, missingField := api.extractPostForms(c, "email_address")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// find email address associated with the user account
user, err := api.um.FindByEmail(forms["email_address"])
if err != nil {
Fail(c, errors.New(eh.UserSearchError), http.StatusBadRequest)
return
}
// account email must be enabled in order to engage in account recovery processes
if !user.EmailEnabled {
Fail(c, errors.New("account does not have email enabled, unfortunately for security reasons we can't assist in recovery"))
return
}
// construct email message
es := queue.EmailSend{
Subject: "TEMPORAL User Name Reminder",
Content: fmt.Sprintf("your username is %s", user.UserName),
ContentType: "text/html",
UserNames: []string{user.UserName},
Emails: []string{user.EmailAddress},
}
// send message for processing
if err = api.queues.email.PublishMessage(es); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": "username reminder sent account email"})
}
// ResetPassword is used to reset the password associated with a user account
func (api *API) resetPassword(c *gin.Context) {
forms, missingField := api.extractPostForms(c, "email_address")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// find user account associated with the email
user, err := api.um.FindByEmail(forms["email_address"])
if err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
}
// account email must be enabled in order to engage in account reovery process
if !user.EmailEnabled {
Fail(c, errors.New("account does not have email enabled, unfortunately for security reasons we can't assist in recovery"))
return
}
// reset password, generating a random one
newPass, err := api.um.ResetPassword(user.UserName)
if err != nil {
api.LogError(c, err, eh.PasswordResetError)(http.StatusBadRequest)
return
}
// create email message
es := queue.EmailSend{
Subject: "TEMPORAL Password Reset",
Content: fmt.Sprintf("your password is %s", newPass),
ContentType: "text/html",
UserNames: []string{user.UserName},
Emails: []string{user.EmailAddress},
}
// send message to queue system for processing
if err = api.queues.email.PublishMessage(es); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": "password reset, please check your email for a new password"})
}
// UpgradeAccount is used to remove free tier restrictions and enable paid access
// once upgraded, your account can't be reverted
func (api *API) upgradeAccount(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
usages, err := api.usage.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
}
if usages.Tier == models.Unverified {
Fail(c, errors.New("unverified account upgrade process must be done via email verification"))
}
// prevent people from repeatedly calling this granting perpetual credits
if usages.Tier != models.Free {
Fail(c, errors.New("user account is already upgrade"))
return
}
// update tier
if err := api.usage.UpdateTier(username, models.Paid); err != nil {
api.LogError(c, err, eh.TierUpgradeError)(http.StatusBadRequest)
return
}
// find user
user, err := api.um.FindByUserName(username)
if err != nil {
api.LogError(c, err, eh.UserSearchError)(http.StatusBadRequest)
return
}
// create email message
es := queue.EmailSend{
Subject: "TEMPORAL Account Upgraded",
Content: "your account has been upgraded to a paid account!",
ContentType: "text/html",
UserNames: []string{username},
Emails: []string{user.EmailAddress},
}
// send message to queue system for processing
if err = api.queues.email.PublishMessage(es); err != nil {
api.LogError(c, err, eh.QueuePublishError)(http.StatusBadRequest)
return
}
// return
Respond(c, http.StatusOK, gin.H{"response": "account upgraded"})
}
func (api *API) usageData(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get usage data
usages, err := api.usage.FindByUserName(username)
if err != nil {
api.LogError(c, err, "failed to search for account usage data")(http.StatusBadRequest)
return
}
// return data
Respond(c, http.StatusOK, gin.H{"response": usages})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_frontend_test.go | api/v2/routes_frontend_test.go | package v2
import (
"bytes"
"encoding/json"
"io"
"io/ioutil"
"mime/multipart"
"net/http/httptest"
"net/url"
"os"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
)
func Test_API_Routes_Frontend(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// test pin cost calculate
// /v2/frontend/cost/calculate/:hash/:holTime
var floatAPIResp floatAPIResponse
if err := sendRequest(
api, "GET", "/v2/frontend/cost/calculate/"+hash+"/5", 200, nil, nil, &floatAPIResp,
); err != nil {
t.Fatal(err)
}
if floatAPIResp.Code != 200 {
t.Fatal("bad response code from /v2/frontend/cost/calculate")
}
// test file upload cost calculation
// /v2/frontend/cost/calculate/file
bodyBuf := &bytes.Buffer{}
bodyWriter := multipart.NewWriter(bodyBuf)
fileWriter, err := bodyWriter.CreateFormFile("file", "../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
fh, err := os.Open("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
defer fh.Close()
if _, err = io.Copy(fileWriter, fh); err != nil {
t.Fatal(err)
}
bodyWriter.Close()
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest("POST", "/v2/frontend/cost/calculate/file", bodyBuf)
req.Header.Add("Authorization", authHeader)
req.Header.Add("Content-Type", bodyWriter.FormDataContentType())
urlValues := url.Values{}
urlValues.Add("hold_time", "5")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Code != 200 {
t.Fatal("bad http status code recovered from /v2/frontend/cost/calculate/file")
}
floatAPIResp = floatAPIResponse{}
// unmarshal the response
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
t.Fatal(err)
}
if err = json.Unmarshal(bodyBytes, &floatAPIResp); err != nil {
t.Fatal(err)
}
// validate the response code
if floatAPIResp.Code != 200 {
t.Fatal("bad api status code from /v2/frontend/cost/calculate/file")
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_database_test.go | api/v2/routes_database_test.go | package v2
import (
"net/url"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
)
func Test_API_Routes_Database(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// create uploads to test searching with
up1, err := api.upm.NewUpload("testhash123", "file", models.UploadOptions{
Username: "testuser",
FileName: "dogpic123.jpg",
HoldTimeInMonths: 1,
})
if err != nil {
t.Fatal(err)
}
defer api.upm.DB.Unscoped().Delete(up1)
up2, err := api.upm.NewUpload("testhash1234", "file", models.UploadOptions{
Username: "testuser",
FileName: "catpic123.jpg",
HoldTimeInMonths: 1,
})
if err != nil {
t.Fatal(err)
}
defer api.upm.DB.Unscoped().Delete(up2)
up3, err := api.upm.NewUpload("testhash12345", "file", models.UploadOptions{
Username: "testuser",
FileName: "bigdogpic123.jpg",
HoldTimeInMonths: 1,
})
if err != nil {
t.Fatal(err)
}
defer api.upm.DB.Unscoped().Delete(up3)
type args struct {
wantName map[string]bool
query string
wantCode int
}
tests := []struct {
name string
args args
}{
{"dog", args{
map[string]bool{"bigdogpic123.jpg": true, "dogpic123.jpg": true},
"%dog%", 200,
}},
{"cat", args{
map[string]bool{"catpic123.jpg": true},
"%cat%", 200,
}},
{"pic", args{
map[string]bool{"dogpic123.jpg": true, "bigdogpic123.jpg": true, "catpic123.jpg": true},
"%pic%", 200,
}},
}
// test search (non paged)
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
var searchAPIResp searchAPIResponse
if err := sendRequest(
api, "POST", "/v2/database/uploads/search", tt.args.wantCode, nil, url.Values{
"search_query": []string{tt.args.query},
}, &searchAPIResp,
); err != nil {
t.Fatal(err)
}
if len(searchAPIResp.Response) != len(tt.args.wantName) {
t.Fatal("bad count")
}
for _, up := range searchAPIResp.Response {
if !tt.args.wantName[up.FileNameLowerCase] {
t.Fatal("bad upload found")
}
}
})
}
// test search (paged)
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
var searchAPIResp searchAPIResponse
if err := sendRequest(
api, "POST", "/v2/database/uploads/search", tt.args.wantCode, nil, url.Values{
"search_query": []string{tt.args.query},
"paged": []string{"true"},
}, &searchAPIResp,
); err != nil {
t.Fatal(err)
}
if len(searchAPIResp.Response) != len(tt.args.wantName) {
t.Fatal("bad count")
}
for _, up := range searchAPIResp.Response {
if !tt.args.wantName[up.FileNameLowerCase] {
t.Fatal("bad upload found")
}
}
})
}
tests = []struct {
name string
args args
}{
{"1", args{
nil,
"drop table", 400,
}},
{"2", args{
nil,
"drop column", 400,
}},
{"3", args{
nil,
"drop row", 400,
}},
{"4", args{
nil,
"delete table", 400,
}},
{"5", args{
nil,
"delete column", 400,
}},
{"6", args{
nil,
"delete row", 400,
}},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
var interfaceAPIResp interfaceAPIResponse
if err := sendRequest(
api, "POST", "/v2/database/uploads/search", tt.args.wantCode, nil, url.Values{
"search_query": []string{tt.args.query},
}, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
})
}
// test database specific uploads
// /v2/database/uploads/testuser
var interfaceAPIResp interfaceAPIResponse
if err := sendRequest(
api, "GET", "/v2/database/uploads", 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
// test paginated
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequestPaged(
api,
"GET",
"/v2/database/uploads",
200,
nil,
url.Values{"paged": {"true"}},
&interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
// test get encrypted uploads
// /v2/frontend/uploads/encrypted
if err := sendRequest(
api, "GET", "/v2/database/uploads/encrypted", 200, nil, nil, nil,
); err != nil {
t.Fatal(err)
}
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequestPaged(
api,
"GET",
"/v2/database/uploads/encrypted",
200,
nil,
url.Values{"paged": {"true"}},
&interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_lens.go | api/v2/routes_lens.go | package v2
import (
"errors"
"net/http"
"github.com/RTradeLtd/Temporal/eh"
pb "github.com/RTradeLtd/grpc/lensv2"
"github.com/gin-gonic/gin"
gocid "github.com/ipfs/go-cid"
)
func (api *API) submitIndexRequest(c *gin.Context) {
// extract post forms
forms, missingField := api.extractPostForms(c, "object_type", "object_identifier")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
var indexType pb.IndexReq_Type
// ensure the type being requested is supported
switch forms["object_type"] {
case "ipld":
// validate the object identifier
if _, err := gocid.Decode(forms["object_identifier"]); err != nil {
Fail(c, err)
return
}
indexType = pb.IndexReq_IPLD
default:
Fail(c, errors.New(eh.InvalidObjectTypeError))
return
}
resp, err := api.lens.Index(c, &pb.IndexReq{
Type: indexType,
Hash: forms["object_identifier"],
Options: &pb.IndexReq_Options{
Reindex: c.PostForm("reindex") == "true",
},
})
if err != nil {
api.LogError(c, err, eh.FailedToIndexError)(http.StatusBadRequest)
return
}
Respond(c, http.StatusOK, gin.H{"response": resp.GetDoc()})
}
func (api *API) submitSearchRequest(c *gin.Context) {
// query we will use to perform as the main search
query, exists := c.GetPostForm("query")
if !exists {
FailWithMissingField(c, "query")
return
}
var (
tags, _ = c.GetPostFormArray("tags")
categories, _ = c.GetPostFormArray("categories")
mimeTypes, _ = c.GetPostFormArray("mime_types")
hashes, _ = c.GetPostFormArray("hashes")
required, _ = c.GetPostFormArray("required")
)
resp, err := api.lens.Search(c, &pb.SearchReq{
Query: query,
Options: &pb.SearchReq_Options{
Tags: tags,
Categories: categories,
MimeTypes: mimeTypes,
Hashes: hashes,
Required: required,
},
})
if err != nil {
api.LogError(c, err, eh.FailedToSearchError)(http.StatusBadRequest)
return
}
// check to ensure some objects were found, otherwise log a warning
if len(resp.Results) == 0 {
Respond(c, http.StatusBadRequest, gin.H{"response": "no results found"})
return
}
Respond(c, http.StatusOK, gin.H{"response": resp})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/log.go | api/v2/log.go | package v2
import (
"github.com/gin-gonic/gin"
)
// LogError is a wrapper used by the API to handle logging of errors. Returns a
// callback to also fail a gin context with an optional status code, which
// defaults to http.StatusInternalServerError. Fields is an optional set of
// params provided in pairs, where the first of a pair is the key, and the second
// is the value
//
// Passing in the initial gin.Context to LogError is used to extract the X-Request-ID associated
// with the given request to make it easier to debug user-submitted erros.
func (api *API) LogError(c *gin.Context, err error, message string, fields ...interface{}) func(code ...int) {
// create base entry with the associated request id
// for some reason this is being set as `X-Request-Id` despite initially
// setting the header to `X-Request-ID`
var logger = api.l.With("request-id", c.GetHeader("X-Request-Id"))
// write log
if fields != nil && len(fields)%2 == 0 {
logger.Errorw(message, append(fields, "error", err.Error())...)
} else {
logger.Errorw(message, "error", err.Error())
}
// return utility callback
if message == "" && err != nil {
return func(code ...int) { Fail(c, err, code...) }
}
return func(code ...int) { FailWithMessage(c, message, code...) }
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/utils_test.go | api/v2/utils_test.go | package v2
import (
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/Temporal/utils"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
)
func TestEmailJWT(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
randUtils := utils.GenerateRandomUtils()
// create a user for this test
randEmail := randUtils.GenerateString(32, utils.LetterBytes) + "@example.org"
randUser := randUtils.GenerateString(32, utils.LetterBytes)
if _, err := api.um.NewUserAccount(randUser, "password123", randEmail); err != nil {
t.Fatal(err)
}
// generate the email verification string
userModel, err := api.um.GenerateEmailVerificationToken(randUser)
if err != nil {
t.Fatal(err)
}
tkn, err := api.generateEmailJWTToken(randUser, userModel.EmailVerificationToken)
if err != nil {
t.Fatal(err)
}
if err := api.verifyEmailJWTToken(tkn, randUser); err != nil {
t.Fatal(err)
}
}
func Test_CheckAccessForPrivateNetwork(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
um := models.NewUserManager(db)
if err := um.AddIPFSNetworkForUser("testuser", "mynewnetworktotestwith"); err != nil {
t.Fatal(err)
}
// search for a non-existent user
if err := CheckAccessForPrivateNetwork("notarealuseraccount", "notarealnetwork", db); err == nil {
t.Fatal("expected error")
}
// search for network user does not have access to
if err := CheckAccessForPrivateNetwork("testuser", "thisnetworkdoesnotexist", db); err == nil {
t.Fatal("expected error")
}
if err := CheckAccessForPrivateNetwork("testuser", "mynewnetworktotestwith", db); err != nil {
t.Fatal(err)
}
}
func Test_GetIPFSEndPoint(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
dev = !dev
if net := api.GetIPFSEndpoint("network"); net == "" {
t.Fatal("bad network url recovered")
}
dev = !dev
if net := api.GetIPFSEndpoint("network"); net == "" {
t.Fatal("bad network url recovered")
}
}
func Test_Ensure_Two_Year_Max(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
randUtils := utils.GenerateRandomUtils()
randString := randUtils.GenerateString(32, utils.LetterBytes)
um := models.NewUploadManager(db)
if err != nil {
t.Fatal(err)
}
type args struct {
holdTimeInMonths int64
tier models.DataUsageTier
}
tests := []struct {
name string
args args
wantErr bool
}{
{"12-Months-paid", args{12, models.Paid}, false},
{"22-Months-paid", args{22, models.Paid}, false},
{"25-Months-paid", args{25, models.Paid}, true},
{"10-Months-unverified", args{10, models.Unverified}, false},
{"11-Months-unverified", args{11, models.Unverified}, false},
{"12-Months-unverified", args{12, models.Unverified}, true},
{"22-Months-unverified", args{22, models.Unverified}, true},
{"25-Months-unverified", args{25, models.Unverified}, true},
{"10-Months-free", args{10, models.Free}, false},
{"11-Months-free", args{11, models.Free}, false},
{"12-Months-free", args{12, models.Free}, true},
{"22-Months-free", args{22, models.Free}, true},
{"25-Months-free", args{25, models.Free}, true},
{"12-Months-partner", args{12, models.Partner}, false},
{"22-Months-partner", args{22, models.Partner}, false},
{"25-Months-partner", args{25, models.Partner}, true},
{"12-Months-whitelabeled", args{12, models.WhiteLabeled}, false},
{"22-Months-whitelabeled", args{22, models.WhiteLabeled}, false},
{"25-Months-whitelabeled", args{25, models.WhiteLabeled}, true},
{"not-a-real-tier", args{12, models.DataUsageTier("thetierisalie")}, true},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
upload, err := um.NewUpload(
randString,
"file",
models.UploadOptions{
Username: "testuser",
NetworkName: "public",
HoldTimeInMonths: 1,
Encrypted: false,
},
)
if err != nil {
t.Fatal(err)
}
if err := api.ensureLEMaxPinTime(
upload,
tt.args.holdTimeInMonths,
tt.args.tier,
); (err != nil) != tt.wantErr {
t.Fatalf("ensureTwoYearMax err = %v, wantErr %v", err, tt.wantErr)
}
um.DB.Unscoped().Delete(upload)
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_swarm_test.go | api/v2/routes_swarm_test.go | package v2
import (
"bytes"
"encoding/json"
"io"
"io/ioutil"
"mime/multipart"
"net/http/httptest"
"net/url"
"os"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
)
func Test_Routes_Swarm(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
cfg.Ethereum.Swarm.URL1 = "http://localhost:8500"
cfg.Ethereum.Swarm.URL2 = "http://localhost:8500"
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
usr, err := api.um.NewUserAccount("ethswarmtest", "password123", "ethswarmtest@google.ca")
if err != nil {
t.Fatal(err)
}
usr, err = api.um.ValidateEmailVerificationToken("ethswarmtest", usr.EmailVerificationToken)
if err != nil {
t.Fatal(err)
}
// add a file normally
bodyBuf := &bytes.Buffer{}
bodyWriter := multipart.NewWriter(bodyBuf)
fileWriter, err := bodyWriter.CreateFormFile("file", "../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
fh, err := os.Open("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
defer fh.Close()
if _, err := io.Copy(fileWriter, fh); err != nil {
t.Fatal(err)
}
bodyWriter.Close()
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest("POST", "/v2/swarm/upload", bodyBuf)
req.Header.Add("Authorization", authHeader)
req.Header.Add("Content-Type", bodyWriter.FormDataContentType())
urlValues := url.Values{}
urlValues.Add("hold_time", "5")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Code != 200 {
t.Fatal("bad http status code recovered from /v2/swarm/upload")
}
var apiResp apiResponse
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
t.Fatal(err)
}
if err := json.Unmarshal(bodyBytes, &apiResp); err != nil {
t.Fatal(err)
}
if apiResp.Code != 200 {
t.Fatal("bad api response status code from /v2/swarm/upload")
}
if _, err := api.upm.FindUploadByHashAndNetwork(apiResp.Response, "etherswarm"); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_account_test.go | api/v2/routes_account_test.go | package v2
import (
"net/url"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
)
func Test_API_Routes_Account(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// verify the username from the token
// /v2/account/token/username
var apiResp apiResponse
if err := sendRequest(
api, "GET", "/v2/account/token/username", 200, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/token/username")
}
if apiResp.Response != "testuser" {
t.Fatal("bad username recovered from token")
}
// verify account password change - success
// /v2/account/password/change
urlValues := url.Values{}
urlValues.Add("old_password", "admin")
urlValues.Add("new_password", "admin1234@")
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/account/password/change", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/password/change")
}
// verify account password change - failure
// /v2/account/password/change
urlValues = url.Values{}
urlValues.Add("old_password", "admin")
urlValues.Add("new_password", "admin1234@")
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/account/password/change", 400, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 400 {
t.Fatal("bad api status code from /v2/account/password/change")
}
// get ipfs keys - no keys created
// /v2/account/key/ipfs/get
apiResp = apiResponse{}
if err := sendRequest(
api, "GET", "/v2/account/key/ipfs/get", 404, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 404 {
t.Fatal("bad api status code from /v2/account/key/ipfs/get")
}
// create ipfs keys
// /v2/account/key/ipfs/new
urlValues = url.Values{}
urlValues.Add("key_type", "ed25519")
urlValues.Add("key_bits", "256")
urlValues.Add("key_name", "key1")
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/account/key/ipfs/new", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/key/ipfs/new")
}
// test rsa keys
urlValues.Add("key_type", "rsa")
urlValues.Add("key_bits", "2048")
urlValues.Add("key_name", "key2")
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/account/key/ipfs/new", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/key/ipfs/new")
}
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/key/ipfs/new")
}
// manually create the keys since we arent using queues
if err := models.NewUserManager(db).AddIPFSKeyForUser("testuser", "key1", "muchwow"); err != nil {
t.Fatal(err)
}
if err := models.NewUserManager(db).AddIPFSKeyForUser("testuser", "key2", "suchkey"); err != nil {
t.Fatal(err)
}
// create ipfs key - bad key bit
// /v2/account/key/ipfs/new
urlValues = url.Values{}
urlValues.Add("key_type", "ed25519")
urlValues.Add("key_bits", "notanumber")
urlValues.Add("key_name", "key1")
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/account/key/ipfs/new", 400, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 400 {
t.Fatal("bad api status code from /v2/account/key/ipfs/new")
}
// get ipfs keys
// /v2/account/key/ipfs/get
var mapAPIResp mapAPIResponse
if err := sendRequest(
api, "GET", "/v2/account/key/ipfs/get", 200, nil, nil, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if mapAPIResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/key/ipfs/get")
}
// get available credits
// /v2/account/credits/available
var floatAPIResp floatAPIResponse
if err := sendRequest(
api, "GET", "/v2/account/credits/available", 200, nil, nil, &floatAPIResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if floatAPIResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/credits/available")
}
// test email activation
// /v2/account/email/verify/:user/:token
if _, err := api.um.NewUserAccount("verificationtestuser", "password123", "verificationtestuser@example.org"); err != nil {
t.Fatal(err)
}
userModel, err := api.um.GenerateEmailVerificationToken("verificationtestuser")
if err != nil {
t.Fatal(err)
}
token, err := api.generateEmailJWTToken("verificationtestuser", userModel.EmailVerificationToken)
if err != nil {
t.Fatal(err)
}
apiResp = apiResponse{}
if err := sendRequest(
api, "GET", "/v2/account/email/verify/"+userModel.UserName+"/"+token, 200, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
// forgot email
// /v2/account/email/forgot
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/account/email/forgot", 200, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/email/forgot")
}
// test@email.com
// forgot username
// /v2/forgot/username
apiResp = apiResponse{}
urlValues = url.Values{}
urlValues.Add("email_address", "test@email.com")
if err := sendRequest(
api, "POST", "/v2/forgot/username", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/forgot/username")
}
// test@email.com
// forgot password
// /v2/forgot/password
apiResp = apiResponse{}
urlValues = url.Values{}
urlValues.Add("email_address", "test@email.com")
if err := sendRequest(
api, "POST", "/v2/forgot/password", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/forgot/password")
}
// upgrade account
// /v2/account/upgrade
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/account/upgrade", 200, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/upgrade")
}
// usage data
// /v2/account/upgrade
var interfaceAPIResp interfaceAPIResponse
if err := sendRequest(
api, "GET", "/v2/account/usage", 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if interfaceAPIResp.Code != 200 {
t.Fatal("bad api status code from /v2/account/usage")
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/context.go | api/v2/context.go | package v2
import (
"errors"
"fmt"
"net/http"
"strings"
jwt "github.com/appleboy/gin-jwt"
"github.com/gin-gonic/gin"
)
// Fail fails context with given error and optional status code. Defaults to
// http.StatusInternalServerError
func Fail(c *gin.Context, err error, code ...int) {
c.JSON(status(code), gin.H{
"code": status(code),
"response": err.Error(),
})
}
// FailWithMessage fails context with given message and optional status code.
// Defaults to http.StatusInternalServerError
func FailWithMessage(c *gin.Context, message string, code ...int) {
c.JSON(status(code), gin.H{
"code": status(code),
"response": message,
})
}
// FailWithBadRequest fails context with a bad request error and given message
func FailWithBadRequest(c *gin.Context, message string) {
FailWithMessage(c, message, http.StatusBadRequest)
}
// FailWithMissingField is a failure used when a post form does not exist
func FailWithMissingField(c *gin.Context, field string) {
FailWithBadRequest(c, fmt.Sprintf("%s not present", field))
}
// FailNotAuthorized is a failure used when a user is unauthorized for an action
func FailNotAuthorized(c *gin.Context, message string) {
c.JSON(http.StatusForbidden, gin.H{
"code": http.StatusForbidden,
"response": message,
})
}
// GetAuthenticatedUserFromContext is used to pull the eth address of hte user
func GetAuthenticatedUserFromContext(c *gin.Context) (string, error) {
claims := jwt.ExtractClaims(c)
id, ok := claims["id"]
if !ok {
return "", errors.New("failed to extract claim id")
}
strID, ok := id.(string)
if !ok {
return "", errors.New("failed to parse claim id")
}
if strID == "" {
return "", errors.New("no username recovered")
}
// this is their eth address
return strID, nil
}
// GetAuthToken is used to retrieve the jwt token
// from an authenticated request
func GetAuthToken(c *gin.Context) string {
token := strings.Split(c.GetHeader("Authorization"), " ")
if len(token) < 2 {
return ""
}
return token[1]
}
// Respond is a wrapper used to handle API responses
func Respond(c *gin.Context, status int, body gin.H) {
body["code"] = status
c.JSON(status, body)
}
// status is used to handle optional status code params
func status(i []int) (status int) {
if len(i) == 0 {
status = http.StatusBadRequest
} else {
status = i[0]
}
return
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_rtfsp_test.go | api/v2/routes_rtfsp_test.go | package v2
import (
"bytes"
"encoding/json"
"io"
"io/ioutil"
"mime/multipart"
"net/http/httptest"
"net/url"
"os"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
pbOrch "github.com/RTradeLtd/grpc/nexus"
)
func Test_API_Routes_IPFS_Private(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
nm := models.NewHostedNetworkManager(db)
// create private network - failure missing name
// /v2/ipfs/private/new
var apiResp apiResponse
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/new", 400, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
if apiResp.Code != 400 {
t.Fatal("bad api status code from /v2/ipfs/private/network/new")
}
if apiResp.Response != "network_name not present" {
t.Fatal("failed to detect missing network_name field")
}
// create private network - failure name is PUBLIC
// /v2/ipfs/private/new
apiResp = apiResponse{}
urlValues := url.Values{}
urlValues.Add("network_name", "PUBLIC")
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/new", 400, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
if apiResp.Code != 400 {
t.Fatal("bad api status code from /v2/ipfs/private/network/new")
}
// create private network - failure name is public
// /v2/ipfs/private/new
apiResp = apiResponse{}
urlValues = url.Values{}
urlValues.Add("network_name", "public")
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/new", 400, nil, nil, &apiResp,
); err != nil {
t.Fatal(err)
}
if apiResp.Code != 400 {
t.Fatal("bad api status code from /v2/ipfs/private/network/new")
}
// create private network
// /v2/ipfs/private/new
var mapAPIResp mapAPIResponse
urlValues = url.Values{}
urlValues.Add("network_name", "abc123")
fakeOrch.StartNetworkReturnsOnCall(0, &pbOrch.StartNetworkResponse{PeerId: "hello", SwarmKey: testSwarmKey}, nil)
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/new", 200, nil, urlValues, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
if mapAPIResp.Code != 200 {
t.Fatal("bad api response status code from /v2/ipfs/private/new")
}
if mapAPIResp.Response["network_name"] != "abc123" {
t.Fatal("failed to retrieve correct network name")
}
if mapAPIResp.Response["peer_id"] != "hello" {
t.Fatal("failed to retrieve correct api url")
}
if mapAPIResp.Response["swarm_key"] != testSwarmKey {
t.Fatal("failed to get correct swarm key")
}
if err := nm.UpdateNetworkByName("abc123", map[string]interface{}{
"api_url": cfg.IPFS.APIConnection.Host + ":" + cfg.IPFS.APIConnection.Port,
}); err != nil {
t.Fatal(err)
}
// create private network with parameters
// /v2/ipfs/private/network
mapAPIResp = mapAPIResponse{}
urlValues = url.Values{}
urlValues.Add("network_name", "xyz123")
urlValues.Add("swarm_key", testSwarmKey)
urlValues.Add("bootstrap_peers", testBootstrapPeer1)
urlValues.Add("bootstrap_peers", testBootstrapPeer2)
urlValues.Add("users", "testuser")
urlValues.Add("users", "testuser2")
fakeOrch.StartNetworkReturnsOnCall(1, &pbOrch.StartNetworkResponse{PeerId: "hello", SwarmKey: "swarmStorm"}, nil)
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/new", 200, nil, urlValues, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
if mapAPIResp.Code != 200 {
t.Fatal("bad api response status code from /v2/ipfs/private/new")
}
if mapAPIResp.Response["network_name"] != "xyz123" {
t.Fatal("failed to retrieve correct network name")
}
if mapAPIResp.Response["peer_id"] != "hello" {
t.Fatal("failed to retrieve correct api url")
}
if mapAPIResp.Response["swarm_key"] != "swarmStorm" {
t.Fatal("failed to get correct swarm key")
}
// get private network information
// /v2/ipfs/private/network/:name
var interfaceAPIResp interfaceAPIResponse
if err := sendRequest(
api, "GET", "/v2/ipfs/private/network/abc123", 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 200 {
t.Fatal("bad api response status code from /v2/ipfs/private/network/abc123")
}
// get all authorized private networks
// /v2/ipfs/private/networks
var stringSliceAPIResp stringSliceAPIResponse
if err := sendRequest(
api, "GET", "/v2/ipfs/private/networks", 200, nil, nil, &stringSliceAPIResp,
); err != nil {
t.Fatal(err)
}
if stringSliceAPIResp.Code != 200 {
t.Fatal("bad api response status code from /v2/ipfs/private/networks")
}
if len(stringSliceAPIResp.Response) == 0 {
t.Fatal("failed to find any from /v2/ipfs/private/networks")
}
var found bool
for _, v := range stringSliceAPIResp.Response {
if v == "abc123" {
found = true
break
}
}
if !found {
t.Fatal("failed to find correct network from /v2/ipfs/private/networks")
}
// stop private network
// /v2/ipfs/private/network/stop
// for now until we implement proper grpc testing, this will fail
mapAPIResp = mapAPIResponse{}
urlValues = url.Values{}
urlValues.Add("network_name", "abc123")
fakeOrch.StopNetworkReturnsOnCall(0, &pbOrch.Empty{}, nil)
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/stop", 200, nil, urlValues, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
if mapAPIResp.Code != 200 {
t.Fatal("bad api resposne code from /v2/ipfs/private/network/stop")
}
if mapAPIResp.Response["state"] != "stopped" {
t.Fatal("failed to stop network")
}
// start private network
// /v2/ipfs/private/network/start
// for now until we implement proper grpc testing, this will fail
mapAPIResp = mapAPIResponse{}
urlValues = url.Values{}
urlValues.Add("network_name", "abc123")
fakeOrch.StartNetworkReturnsOnCall(2, &pbOrch.StartNetworkResponse{PeerId: "hello", SwarmKey: "test"}, nil)
if err := sendRequest(
api, "POST", "/v2/ipfs/private/network/start", 200, nil, urlValues, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
if mapAPIResp.Code != 200 {
t.Fatal("bad api resposne code from /v2/ipfs/private/network/stop")
}
if mapAPIResp.Response["state"] != "started" {
t.Fatal("failed to stop network")
}
// add a file normally
// /v2/ipfs/private/file/add
bodyBuf := &bytes.Buffer{}
bodyWriter := multipart.NewWriter(bodyBuf)
fileWriter, err := bodyWriter.CreateFormFile("file", "../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
fh, err := os.Open("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
defer fh.Close()
if _, err = io.Copy(fileWriter, fh); err != nil {
t.Fatal(err)
}
bodyWriter.Close()
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest("POST", "/v2/ipfs/private/file/add", bodyBuf)
req.Header.Add("Authorization", authHeader)
req.Header.Add("Content-Type", bodyWriter.FormDataContentType())
urlValues = url.Values{}
urlValues.Add("hold_time", "5")
urlValues.Add("network_name", "abc123")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Code != 200 {
t.Fatal("bad http status code recovered from /v2/ipfs/private/file/add")
}
apiResp = apiResponse{}
// unmarshal the response
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
t.Fatal(err)
}
if err = json.Unmarshal(bodyBytes, &apiResp); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/ipfs/private/file/add")
}
hash = apiResp.Response
// create a temporary object with
// default template
newObj, err := api.ipfs.NewObject("")
if err != nil {
t.Fatal(err)
}
// test pinning
// /v2/ipfs/private/pin
apiResp = apiResponse{}
urlValues = url.Values{}
urlValues.Add("hold_time", "5")
urlValues.Add("network_name", "abc123")
if err := sendRequest(
api, "POST", "/v2/ipfs/private/pin/"+newObj, 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/ipfs/private/pin")
}
// test pin check
// /v2/ipfs/private/check/pin
var boolAPIResp boolAPIResponse
if err := sendRequest(
api, "GET", "/v2/ipfs/private/pin/check/"+hash+"/abc123", 200, nil, nil, &boolAPIResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if boolAPIResp.Code != 200 {
t.Fatal("bad api status code from /v2/ipfs/private/check/pin")
}
// test pubsub publish
// /v2/ipfs/private/publish/topic
mapAPIResp = mapAPIResponse{}
urlValues = url.Values{}
urlValues.Add("message", "bar")
urlValues.Add("network_name", "abc123")
if err := sendRequest(
api, "POST", "/v2/ipfs/private/pubsub/publish/foo", 200, nil, urlValues, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if mapAPIResp.Code != 200 {
t.Fatal("bad api status code from /v2/ipfs/private/pubsub/publish/topic")
}
if mapAPIResp.Response["topic"] != "foo" {
t.Fatal("bad response")
}
if mapAPIResp.Response["message"] != "bar" {
t.Fatal("bad response")
}
// test object stat
// /v2/ipfs/private/stat
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequest(
api, "GET", "/v2/ipfs/private/stat/"+hash+"/abc123", 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 200 {
t.Fatal("bad response status code from /v2/ipfs/private/stat")
}
// test get dag
// /v2/ipfs/private/dag
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequest(
api, "GET", "/v2/ipfs/private/dag/"+hash+"/abc123", 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 200 {
t.Fatal("bad response status code from /v2/ipfs/private/dag/")
}
// test download
// /v2/ipfs/utils/download
urlValues = url.Values{}
urlValues.Add("network_name", "abc123")
if err := sendRequest(
api, "POST", "/v2/ipfs/utils/download/"+hash, 200, nil, urlValues, nil,
); err != nil {
t.Fatal(err)
}
// test get authorized networks
// /v2/ipfs/private/networks
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequest(
api, "GET", "/v2/ipfs/private/networks", 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 200 {
t.Fatal("bad response status code from /v2/ipfs/private/networks/")
}
// test get authorized networks
// /v2/ipfs/private/networks
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequest(
api, "GET", "/v2/ipfs/private/uploads/abc123", 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 200 {
t.Fatal("bad response status code from /v2/ipfs/private/uploads")
}
// test private network beam - source private, dest public
urlValues = url.Values{}
urlValues.Add("source_network", "abc123")
urlValues.Add("destination_network", "public")
urlValues.Add("content_hash", hash)
urlValues.Add("passphrase", "password123")
if err := sendRequest(
api, "POST", "/v2/ipfs/utils/laser/beam", 200, nil, urlValues, nil,
); err != nil {
t.Fatal(err)
}
// test private network beam - source public, dest private
// /v2/ipfs/utils/laser/beam
urlValues = url.Values{}
urlValues.Add("source_network", "public")
urlValues.Add("destination_network", "abc123")
urlValues.Add("content_hash", hash)
urlValues.Add("passphrase", "password123")
if err := sendRequest(
api, "POST", "/v2/ipfs/utils/laser/beam", 200, nil, urlValues, nil,
); err != nil {
t.Fatal(err)
}
// test private network beam - source private, dest private
// /v2/ipfs/utils/laser/beam
urlValues = url.Values{}
urlValues.Add("source_network", "abc123")
urlValues.Add("destination_network", "abc123")
urlValues.Add("content_hash", hash)
urlValues.Add("passphrase", "password123")
if err := sendRequest(
api, "POST", "/v2/ipfs/utils/laser/beam", 200, nil, urlValues, nil,
); err != nil {
t.Fatal(err)
}
// remove private network
// /v2/ipfs/private/network/remove
// for now until we implement proper grpc testing, this will fail
mapAPIResp = mapAPIResponse{}
urlValues = url.Values{}
urlValues.Add("network_name", "abc123")
fakeOrch.RemoveNetworkReturnsOnCall(0, &pbOrch.Empty{}, nil)
if err := sendRequest(
api, "DELETE", "/v2/ipfs/private/network/remove", 200, nil, urlValues, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
if mapAPIResp.Code != 200 {
t.Fatal("bad api response status code from /v2/ipfs/private/network/remove")
}
if mapAPIResp.Response["state"] != "removed" {
t.Fatal("failed to remove network")
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_rtfs_test.go | api/v2/routes_rtfs_test.go | package v2
import (
"bytes"
"encoding/json"
"fmt"
"io"
"io/ioutil"
"mime/multipart"
"net/http/httptest"
"net/url"
"os"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2/models"
)
func Test_API_Routes_IPFS_Public(t *testing.T) {
// load configuration
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
// update the users tier
if err := api.usage.UpdateTier("testuser", models.Paid); err != nil {
t.Fatal(err)
}
// add a file normally
// /v2/ipfs/public/file/add
bodyBuf := &bytes.Buffer{}
bodyWriter := multipart.NewWriter(bodyBuf)
fileWriter, err := bodyWriter.CreateFormFile("file", "../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
fh, err := os.Open("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
defer fh.Close()
if _, err = io.Copy(fileWriter, fh); err != nil {
t.Fatal(err)
}
bodyWriter.Close()
testRecorder := httptest.NewRecorder()
req := httptest.NewRequest("POST", "/v2/ipfs/public/file/add", bodyBuf)
req.Header.Add("Authorization", authHeader)
req.Header.Add("Content-Type", bodyWriter.FormDataContentType())
urlValues := url.Values{}
urlValues.Add("hold_time", "5")
req.PostForm = urlValues
api.r.ServeHTTP(testRecorder, req)
if testRecorder.Code != 200 {
t.Fatal("bad http status code recovered from /v2/ipfs/public/file/add")
}
var apiResp apiResponse
// unmarshal the response
bodyBytes, err := ioutil.ReadAll(testRecorder.Result().Body)
if err != nil {
t.Fatal(err)
}
if err = json.Unmarshal(bodyBytes, &apiResp); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
t.Fatal("bad api status code from /v2/ipfs/public/file/add")
}
hash = apiResp.Response
// temporary fix for a badly written this
// this will be solved in test refactoring
models.NewUploadManager(db).NewUpload(
hash, "file", models.UploadOptions{
Username: "testuser",
NetworkName: "public",
Encrypted: false,
},
)
// test pinning - success
// /v2/ipfs/public/pin
apiResp = apiResponse{}
urlValues = url.Values{}
urlValues.Add("hold_time", "5")
if err := sendRequest(
api, "POST", "/v2/ipfs/public/pin/"+testPIN2, 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 200 {
fmt.Printf("%+v\n", apiResp)
t.Fatal("bad api status code from /v2/ipfs/public/pin")
}
// test pinning - failure (bad hash)
// /v2/ipfs/public/pin
apiResp = apiResponse{}
urlValues = url.Values{}
urlValues.Add("hold_time", "5")
if err := sendRequest(
api, "POST", "/v2/ipfs/public/pin/notarealhash", 400, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 400 {
t.Fatal("bad api status code from /v2/ipfs/public/pin")
}
// test pinning - failure (bad hold_time)
// /v2/ipfs/public/pin
apiResp = apiResponse{}
urlValues = url.Values{}
urlValues.Add("hold_time", "notanumber")
if err := sendRequest(
api, "POST", "/v2/ipfs/public/pin/"+hash, 400, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if apiResp.Code != 400 {
t.Fatal("bad api status code from /v2/ipfs/public/pin")
}
// test pubsub publish (success)
// /v2/ipfs/pubsub/publish/topic
urlValues = url.Values{}
urlValues.Add("message", "bar")
var mapAPIResp mapAPIResponse
if err := sendRequest(
api, "POST", "/v2/ipfs/public/pubsub/publish/foo", 200, nil, urlValues, &mapAPIResp,
); err != nil {
t.Fatal(err)
}
// validate the response code
if mapAPIResp.Code != 200 {
t.Fatal("bad api status code from /v2/pubsub/publish/topic")
}
if mapAPIResp.Response["topic"] != "foo" {
t.Fatal("bad response")
}
if mapAPIResp.Response["message"] != "bar" {
t.Fatal("bad response")
}
// test pubsub publish (fail)
// /v2/ipfs/pubsub/publish/topic
urlValues = url.Values{}
urlValues.Add("message", "")
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/ipfs/public/pubsub/publish/foo", 400, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
if apiResp.Code != 400 {
t.Fatal("bad response status code from /v2/ipfs/public/pubsub/publish")
}
// test object stat (success)
// /v2/ipfs/stat
var interfaceAPIResp interfaceAPIResponse
if err := sendRequest(
api, "GET", "/v2/ipfs/public/stat/"+hash, 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 200 {
t.Fatal("bad response status code from /v2/ipfs/public/stat")
}
// test object stat (fail)
// /v2/ipfs/stat
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequest(
api, "GET", "/v2/ipfs/public/stat/notarealhash", 400, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 400 {
t.Fatal("bad response status code from /v2/ipfs/public/stat")
}
// test get dag (success)
// /v2/ipfs/public/dag
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequest(
api, "GET", "/v2/ipfs/public/dag/"+hash, 200, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 200 {
t.Fatal("bad response status code from /v2/ipfs/public/dag/")
}
// test get dag (fail)
// /v2/ipfs/public/dag
interfaceAPIResp = interfaceAPIResponse{}
if err := sendRequest(
api, "GET", "/v2/ipfs/public/dag/notarealhash", 400, nil, nil, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != 400 {
t.Fatal("bad response status code from /v2/ipfs/public/dag/")
}
// test download
// /v2/ipfs/utils/download
if err := sendRequest(
api, "POST", "/v2/ipfs/utils/download/"+hash, 200, nil, nil, nil,
); err != nil {
t.Fatal(err)
}
// test public network beam
// /v2/ipfs/utils/laser/beam
urlValues = url.Values{}
urlValues.Add("source_network", "public")
urlValues.Add("destination_network", "public")
urlValues.Add("content_hash", hash)
urlValues.Add("passphrase", "password123")
if err := sendRequest(
api, "POST", "/v2/ipfs/utils/laser/beam", 200, nil, urlValues, nil,
); err != nil {
t.Fatal(err)
}
// test extend pin
// /v2/ipfs/public/pin/:hash/extend
urlValues = url.Values{}
urlValues.Add("hold_time", "5")
apiResp = apiResponse{}
if err := sendRequest(
api, "POST", "/v2/ipfs/public/pin/"+hash+"/extend", 200, nil, urlValues, &apiResp,
); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_lens_test.go | api/v2/routes_lens_test.go | package v2
import (
"errors"
"net/url"
"testing"
"github.com/RTradeLtd/Temporal/mocks"
"github.com/RTradeLtd/config/v2"
pb "github.com/RTradeLtd/grpc/lensv2"
)
var (
lensTestHash = "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"
)
func Test_API_Routes_Lens_Index(t *testing.T) {
type args struct {
objectType string
objectIdentifier string
reindex string
callCount int
err error
}
tests := []struct {
name string
args args
wantStatus int
}{
{"Index-Requqest-Pass-Reindex", args{"ipld", lensTestHash, "true", 0, nil}, 200},
{"Index-Request-Pass-NoReindex", args{"ipld", lensTestHash, "false", 0, nil}, 200},
{"Index-Request-Fail-Reindex", args{"ipld", lensTestHash, "true", 0, errors.New("bad")}, 400},
{"Index-Request-Fail-NoReindex", args{"ipld", lensTestHash, "false", 0, errors.New("bad")}, 400},
{"Index-Bad-Object-Type", args{"storj", lensTestHash, "false", 0, errors.New("bad")}, 400},
{"Index-Bad-Object-Identifier", args{"ipld", "blah", "false", 0, errors.New("bad")}, 400},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
var interfaceAPIResp interfaceAPIResponse
urlValues := url.Values{}
urlValues.Add("object_identifier", tt.args.objectIdentifier)
urlValues.Add("object_type", tt.args.objectType)
urlValues.Add("reindex", tt.args.reindex)
fakeLens.IndexReturnsOnCall(tt.args.callCount, &pb.IndexResp{Doc: &pb.Document{Hash: tt.args.objectIdentifier}}, tt.args.err)
if err := sendRequest(
api, "POST", "/v2/lens/index", tt.wantStatus, nil, urlValues, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != tt.wantStatus {
t.Fatalf("bad api response status = %v, wantStatus %v", interfaceAPIResp.Code, tt.wantStatus)
}
})
}
}
func Test_API_Routes_Lens_Search(t *testing.T) {
// index tests
type args struct {
query string
tag string
category string
mimeType string
hash string
required string
callCount int
result bool
err error
}
testsIndex := []struct {
name string
args args
wantStatus int
}{
{"Search-Pass-NoResponse", args{"dog", "food", "isnt", "very", "good", "tasting", 0, false, nil}, 400},
{"Search-Pass-Response", args{"cat", "food", "is", "even", "worse", "tasting", 0, true, nil}, 200},
{"Search-Fail", args{"pet", "food", "is", "bad", "in", "general", 0, false, errors.New("bad")}, 400},
}
for _, tt := range testsIndex {
t.Run(tt.name, func(t *testing.T) {
cfg, err := config.LoadConfig("../../testenv/config.json")
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
// setup fake mock clients
fakeLens := &mocks.FakeLensV2Client{}
fakeOrch := &mocks.FakeServiceClient{}
fakeSigner := &mocks.FakeSignerClient{}
fakeWalletService := &mocks.FakeWalletServiceClient{}
api, err := setupAPI(t, fakeLens, fakeOrch, fakeSigner, fakeWalletService, cfg, db)
if err != nil {
t.Fatal(err)
}
if !tt.args.result {
fakeLens.SearchReturnsOnCall(
tt.args.callCount,
&pb.SearchResp{},
tt.args.err,
)
} else {
fakeLens.SearchReturnsOnCall(
tt.args.callCount,
&pb.SearchResp{
Results: []*pb.SearchResp_Result{
{
Score: 0.32,
},
},
},
tt.args.err,
)
}
var interfaceAPIResp interfaceAPIResponse
urlValues := url.Values{}
urlValues.Add("query", tt.args.query)
urlValues.Add("tags", tt.args.tag)
urlValues.Add("categories", tt.args.category)
urlValues.Add("hashes", tt.args.hash)
urlValues.Add("required", tt.args.required)
if err := sendRequest(
api, "POST", "/v2/lens/search", tt.wantStatus, nil, urlValues, &interfaceAPIResp,
); err != nil {
t.Fatal(err)
}
if interfaceAPIResp.Code != tt.wantStatus {
t.Fatalf("bad api response status = %v, wantStatus %v", interfaceAPIResp.Code, tt.wantStatus)
}
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/doc.go | api/v2/doc.go | // Package v2 is the main package for Temporal's V2 http API.
// API reference is available [here](https://documenter.getpostman.com/view/4295780/RWEcQM6W#intro)
package v2
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_swarm.go | api/v2/routes_swarm.go | package v2
import (
"errors"
"io/ioutil"
"net/http"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/Temporal/utils"
"github.com/RTradeLtd/database/v2/models"
"github.com/gin-gonic/gin"
)
// SwarmUpload is used to upload data to ethereum swarm
func (api *API) SwarmUpload(c *gin.Context) {
if len(api.swarmEndpoints) == 0 {
Fail(c, errors.New("must have at least one swarm client"))
return
}
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
holdTime := c.PostForm("hold_time")
holdTimeInMonthsInt, err := api.validateHoldTime(username, holdTime)
if err != nil {
Fail(c, err)
return
}
fileHandler, err := c.FormFile("file")
if err != nil {
Fail(c, err)
return
}
fileSize := fileHandler.Size
// ensure file size is within acceptable parameters
if err := api.FileSizeCheck(fileHandler.Size); err != nil {
Fail(c, err)
return
}
// calculate the cost of the file
cost, err := utils.CalculateFileCost(username, holdTimeInMonthsInt, fileSize, api.usage)
if err != nil {
api.LogError(c, err, eh.CostCalculationError)(http.StatusBadRequest)
return
}
// validate they have enough credits to pay for the upload
if err = api.validateUserCredits(username, cost); err != nil {
api.LogError(c, err, eh.InvalidBalanceError)(http.StatusPaymentRequired)
return
}
// update their data usage
if err := api.usage.UpdateDataUsage(username, uint64(fileSize)); err != nil {
api.LogError(c, err, eh.CantUploadError)(http.StatusBadRequest)
api.refundUserCredits(username, "file", cost)
return
}
// now begin with the actual file uploading
isTar := c.PostForm("is_tar")
// open file handler
openFile, err := fileHandler.Open()
if err != nil {
Fail(c, err)
api.refundUserCredits(username, "file", cost)
api.usage.ReduceDataUsage(username, uint64(fileSize))
return
}
// read file data
fileBytes, err := ioutil.ReadAll(openFile)
if err != nil {
Fail(c, err)
api.refundUserCredits(username, "file", cost)
api.usage.ReduceDataUsage(username, uint64(fileSize))
return
}
// upload to both of our swarm nodes
swarmHash, err := api.swarmUpload(fileBytes, isTar == "true")
if err != nil {
api.LogError(c, err, err.Error())
api.refundUserCredits(username, "file", cost)
api.usage.ReduceDataUsage(username, uint64(fileSize))
return
}
// update uploads
if _, err := api.upm.NewUpload(swarmHash, "swarm-file", models.UploadOptions{
Username: username,
NetworkName: "etherswarm",
HoldTimeInMonths: holdTimeInMonthsInt,
Size: fileSize,
}); err != nil {
Fail(c, err)
api.refundUserCredits(username, "file", cost)
api.usage.ReduceDataUsage(username, uint64(fileSize))
return
}
Respond(c, http.StatusOK, gin.H{"response": swarmHash})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/api/v2/routes_database.go | api/v2/routes_database.go | package v2
import (
"errors"
"html"
"net/http"
"strings"
"github.com/RTradeLtd/Temporal/eh"
"github.com/RTradeLtd/database/v2/models"
"github.com/gin-gonic/gin"
)
// allows performing arbitrary searches against upload file names
func (api *API) searchUploadsForUser(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
forms, missingField := api.extractPostForms(c, "search_query")
if missingField != "" {
FailWithMissingField(c, missingField)
return
}
// escape string to prevent html encoded characters causing issues
forms["search_query"] = html.UnescapeString(forms["search_query"])
// force lower-case to make matching more likely s
lower := strings.ToLower(forms["search_query"])
// just in case lets try and avoid any possible headaches
if strings.Contains(lower, "drop table") ||
strings.Contains(lower, "drop column") ||
strings.Contains(lower, "drop row") ||
strings.Contains(lower, "delete table") ||
strings.Contains(lower, "delete column") ||
strings.Contains(lower, "delete row") {
Fail(c, errors.New("possible sql injection attack, goodbye"), http.StatusBadRequest)
return
}
if c.Query("paged") == "true" {
api.pageIt(
c,
api.upm.DB.Where(
"user_name = ? AND file_name_lower_case LIKE ?",
username, lower,
),
&[]models.Upload{},
)
return
}
uploads, err := api.upm.Search(username, lower)
if err != nil {
api.LogError(c, err, eh.UploadSearchError)(http.StatusBadRequest)
return
}
Respond(c, http.StatusOK, gin.H{"response": uploads})
}
// GetUploadsForUser is used to retrieve all uploads for the authenticated user
func (api *API) getUploadsForUser(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
if c.Query("paged") == "true" {
api.pageIt(c, api.upm.DB.Where("user_name = ?", username), &[]models.Upload{})
return
}
// fetch all uploads by the specified user
uploads, err := api.upm.GetUploadsForUser(username)
if err != nil {
api.LogError(c, err, eh.UploadSearchError)(http.StatusInternalServerError)
return
}
// log and return
api.l.Info("specific uploads from database requested")
Respond(c, http.StatusOK, gin.H{"response": uploads})
}
// getUploadsByNetworkName is used to get uploads for a network by its name
func (api *API) getUploadsByNetworkName(c *gin.Context) {
username, err := GetAuthenticatedUserFromContext(c)
if err != nil {
api.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)
return
}
// get network name to retrieve uploads from
networkName := c.Param("networkName")
// validate the user can access the network
if err := CheckAccessForPrivateNetwork(username, networkName, api.dbm.DB); err != nil {
api.LogError(c, err, eh.PrivateNetworkAccessError)(http.StatusBadRequest)
return
}
if c.Query("paged") == "true" {
api.pageIt(c, api.upm.DB.Where(
"user_name = ? AND network_name = ?",
username, networkName,
), &[]models.Upload{})
return
}
// find uploads for the network
uploads, err := api.upm.FindUploadsByNetwork(networkName)
if err != nil {
api.LogError(c, err, eh.UploadSearchError)(http.StatusInternalServerError)
return
}
// log and return
api.l.Infow("uploads forprivate ifps network requested", "user", username)
Respond(c, http.StatusOK, gin.H{"response": uploads})
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/queue_test.go | queue/queue_test.go | package queue
import (
"context"
"sync"
"testing"
"time"
"go.uber.org/zap/zaptest"
"github.com/streadway/amqp"
"github.com/RTradeLtd/config/v2"
"github.com/RTradeLtd/database/v2"
"github.com/jinzhu/gorm"
)
const (
testCID = "QmS4ustL54uo8FzR9455qaxZwuMiUhyvMcX9Ba8nUH4uVv"
testCID2 = "QmQ5vhrL7uv6tuoN9KeVBwd4PwfQkXdVVmDLUZuTNxqgvm"
testRabbitAddress = "amqp://127.0.0.1:5672"
testLogFilePath = "../testenv/"
testCfgPath = "../testenv/config.json"
)
func TestQueue_Publish(t *testing.T) {
dev = true
type args struct {
queueName Queue
publish bool
}
tests := []struct {
name string
args args
}{
{"PConfirmQ", args{EthPaymentConfirmationQueue, true}},
{"DPCQ", args{DashPaymentConfirmationQueue, true}},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
logger := zaptest.NewLogger(t).Sugar()
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
qm, err := New(tt.args.queueName,
testRabbitAddress, tt.args.publish, dev, cfg, logger)
if err != nil {
t.Fatal(err)
}
if tt.name == "PConfirmQ" {
// test a successful publish
if err := qm.PublishMessage(EthPaymentConfirmation{
UserName: "testuser",
PaymentNumber: 22,
}); err != nil {
t.Fatal(err)
}
// test a bad publish
if err := qm.PublishMessage(map[string]interface{}{
"foo": make(chan int),
}); err == nil {
t.Fatal("expected error")
}
} else if tt.name == "DPCQ" {
// test a successful publish
if err := qm.PublishMessage(DashPaymenConfirmation{
UserName: "testuser",
PaymentForwardID: "paymentforwardi",
PaymentNumber: 23,
}); err != nil {
t.Fatal(err)
}
// test a bad publish
if err := qm.PublishMessage(map[string]interface{}{
"foo": make(chan int),
}); err == nil {
t.Fatal("expected error")
}
}
})
}
}
func TestRegisterChannelClosure(t *testing.T) {
dev = true
logger := zaptest.NewLogger(t).Sugar()
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
qmPublisher, err := New(IpfsPinQueue, testRabbitAddress, true, dev, cfg, logger)
if err != nil {
t.Fatal(err)
}
// declare the channel to receive messages on
qmPublisher.RegisterConnectionClosure()
go func() {
qmPublisher.ErrCh <- &amqp.Error{Code: 400, Reason: "test", Server: true, Recover: false}
}()
msg := <-qmPublisher.ErrCh
if msg.Code != 400 {
t.Fatal("bad code received")
}
if msg.Reason != "test" {
t.Fatal("bad reason")
}
if !msg.Server {
t.Fatal("bad server")
}
if msg.Recover {
t.Fatal("bad recover")
}
if err := qmPublisher.Close(); err != nil {
t.Fatal(err)
}
}
func TestQueue_RefundCredits(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpfsClusterPinQueue, testRabbitAddress, false, dev, cfg, logger)
if err != nil {
t.Fatal(err)
}
qmConsumer.db = db
type args struct {
username string
callType string
cost float64
}
tests := []struct {
name string
args args
wantErr bool
}{
{"HasCost", args{"testuser", "ipfs-pin", 1}, false},
{"NoCost", args{"testuser", "ipfs-pin", 0}, false},
{"RefundFail", args{"userdoesnotexist", "ipfs-pin", 10}, true},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
if err := qmConsumer.refundCredits(tt.args.username, tt.args.callType, tt.args.cost); (err != nil) != tt.wantErr {
t.Fatal(err)
}
})
}
}
func TestQueue_ConnectionClosure(t *testing.T) {
dev = true
logger := zaptest.NewLogger(t).Sugar()
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
type args struct {
queueName Queue
}
tests := []struct {
name string
args args
}{
{IpfsClusterPinQueue.String(), args{IpfsClusterPinQueue}},
{EmailSendQueue.String(), args{EmailSendQueue}},
{IpnsEntryQueue.String(), args{IpnsEntryQueue}},
{IpfsPinQueue.String(), args{IpfsPinQueue}},
{IpfsKeyCreationQueue.String(), args{IpfsKeyCreationQueue}},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
qmPublisher, err := New(tt.args.queueName, testRabbitAddress, false, dev, cfg, logger)
if err != nil {
t.Fatal(err)
}
wg := &sync.WaitGroup{}
wg.Add(1)
go func() {
if err := qmPublisher.ConsumeMessages(context.Background(), wg, db, cfg); err != nil && err.Error() != ErrReconnect {
t.Error(err)
}
}()
go func() {
qmPublisher.ErrCh <- &amqp.Error{Code: 400, Reason: "error", Server: true, Recover: false}
}()
wg.Wait()
})
}
}
// Does not conduct validation of whether or not a message was successfully processed
func TestQueue_IPFSClusterPin(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
loggerPublisher := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpfsClusterPinQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
qmPublisher, err := New(IpfsClusterPinQueue, testRabbitAddress, true, dev, cfg, loggerPublisher)
if err != nil {
t.Fatal(err)
}
defer func() {
if err := qmPublisher.Close(); err != nil {
t.Error(err)
}
}()
// test an already seen update (this comes from the previous database file add)
if err := qmPublisher.PublishMessage(IPFSClusterPin{
CID: testCID,
NetworkName: "public",
UserName: "testuser",
HoldTimeInMonths: 10,
CreditCost: 10,
}); err != nil {
t.Fatal(err)
}
// test a previously unseen upload
if err := qmPublisher.PublishMessage(IPFSClusterPin{
CID: testCID2,
NetworkName: "public",
UserName: "testuser",
HoldTimeInMonths: 10,
CreditCost: 10,
}); err != nil {
t.Fatal(err)
}
// test a bad publish
if err := qmPublisher.PublishMessage(""); err != nil {
t.Fatal(err)
}
// test private network detection
if err := qmPublisher.PublishMessage(IPFSClusterPin{
CID: testCID,
NetworkName: "myprivatenetwork",
UserName: "testuser",
HoldTimeInMonths: 10,
CreditCost: 10,
}); err != nil {
t.Fatal(err)
}
// test invalid cid format
if err := qmPublisher.PublishMessage(IPFSClusterPin{
CID: "notarealcid",
NetworkName: "public",
UserName: "testuser",
HoldTimeInMonths: 10,
CreditCost: 10,
}); err != nil {
t.Fatal(err)
}
waitGroup := &sync.WaitGroup{}
waitGroup.Add(1)
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, waitGroup, db, cfg); err != nil {
t.Fatal(err)
}
waitGroup.Wait()
}
// Does not conduct validation of whether or not a message was successfully processed
func TestQueue_EmailSend(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
loggerPublisher := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(EmailSendQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
qmPublisher, err := New(EmailSendQueue, testRabbitAddress, true, dev, cfg, loggerPublisher)
if err != nil {
t.Fatal(err)
}
defer func() {
if err := qmPublisher.Close(); err != nil {
t.Error(err)
}
}()
// test a email send
if err := qmPublisher.PublishMessage(EmailSend{
Subject: "test email",
Content: "this is a test email",
ContentType: "text/html",
UserNames: []string{"testuser", "testuser"},
Emails: []string{"testuser@example.com", "testuser2@example.com"},
}); err != nil {
t.Fatal(err)
}
// test a bad publish
if err := qmPublisher.PublishMessage(""); err != nil {
t.Fatal(err)
}
waitGroup := &sync.WaitGroup{}
waitGroup.Add(1)
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, waitGroup, db, cfg); err != nil {
t.Fatal(err)
}
waitGroup.Wait()
}
// Does not conduct validation of whether or not a message was successfully processed
func TestQueue_IPNSEntry(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
cfg.Services.RTNS.DatastorePath = "test-ipns"
cfg.Services.RTNS.MultiAddresses = []string{"/ip4/0.0.0.0/tcp/3999"}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
loggerPublisher := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpnsEntryQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
qmPublisher, err := New(IpnsEntryQueue, testRabbitAddress, true, dev, cfg, loggerPublisher)
if err != nil {
t.Fatal(err)
}
defer func() {
if err := qmPublisher.Close(); err != nil {
t.Error(err)
}
}()
// test a valid publish
if err := qmPublisher.PublishMessage(IPNSEntry{
CID: testCID,
LifeTime: time.Minute,
TTL: time.Second,
Resolve: true,
Key: "testkey",
UserName: "testuser",
NetworkName: "public",
CreditCost: 10,
}); err != nil {
t.Fatal(err)
}
// test a bad publish
if err := qmPublisher.PublishMessage(""); err != nil {
t.Fatal(err)
}
// test private network detection
if err := qmPublisher.PublishMessage(IPNSEntry{
CID: testCID,
LifeTime: time.Minute,
TTL: time.Second,
Resolve: true,
Key: "testkey",
UserName: "testuser",
NetworkName: "myprivatenetwork",
CreditCost: 10,
}); err != nil {
t.Fatal(err)
}
waitGroup := &sync.WaitGroup{}
waitGroup.Add(1)
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, waitGroup, db, cfg); err != nil {
t.Fatal(err)
}
waitGroup.Wait()
}
// Does not conduct validation of whether or not a message was successfully processed
func TestQueue_IPFSPin(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
loggerPublisher := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpfsPinQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
qmPublisher, err := New(IpfsPinQueue, testRabbitAddress, true, dev, cfg, loggerPublisher)
if err != nil {
t.Fatal(err)
}
defer func() {
if err := qmPublisher.Close(); err != nil {
t.Error(err)
}
}()
// test a valid pin
if err := qmPublisher.PublishMessage(IPFSPin{
CID: testCID,
NetworkName: "public",
HoldTimeInMonths: 10},
); err != nil {
t.Fatal(err)
}
// test a bad publish
if err := qmPublisher.PublishMessage(""); err != nil {
t.Fatal(err)
}
// test a private network
if err := qmPublisher.PublishMessage(IPFSPin{
CID: testCID,
NetworkName: "myprivatenetwork",
HoldTimeInMonths: 10},
); err != nil {
t.Fatal(err)
}
waitGroup := &sync.WaitGroup{}
waitGroup.Add(1)
// set temporary log dig
cfg.LogDir = "./tmp/"
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, waitGroup, db, cfg); err != nil {
t.Fatal(err)
}
waitGroup.Wait()
}
// Does not conduct validation of whether or not a message was successfully processed
func TestQueue_IPFSKeyCreation(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
loggerPublisher := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpfsKeyCreationQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
qmPublisher, err := New(IpfsKeyCreationQueue, testRabbitAddress, true, dev, cfg, loggerPublisher)
if err != nil {
t.Fatal(err)
}
defer func() {
if err := qmPublisher.Close(); err != nil {
t.Error(err)
}
}()
// test a normal publish
if err := qmPublisher.PublishMessage(IPFSKeyCreation{
UserName: "testuser",
Name: "testuser-mykey",
Type: "rsa",
Size: 2048,
NetworkName: "public",
CreditCost: 0},
); err != nil {
t.Fatal(err)
}
if err := qmPublisher.PublishMessage(IPFSKeyCreation{
UserName: "testuser",
Name: "mykey",
Type: "rsa",
Size: 2048,
NetworkName: "public",
CreditCost: 0},
); err != nil {
t.Fatal(err)
}
// test a bad publish
if err := qmPublisher.PublishMessage(""); err != nil {
t.Fatal(err)
}
waitGroup := &sync.WaitGroup{}
waitGroup.Add(1)
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, waitGroup, db, cfg); err != nil {
t.Fatal(err)
}
waitGroup.Wait()
}
func TestQueue_IPFSKeyCreation_Failure(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
loggerPublisher := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpfsKeyCreationQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
qmPublisher, err := New(IpfsKeyCreationQueue, testRabbitAddress, true, dev, cfg, loggerPublisher)
if err != nil {
t.Fatal(err)
}
defer func() {
if err := qmPublisher.Close(); err != nil {
t.Error(err)
}
}()
if err := qmPublisher.PublishMessage(IPFSKeyCreation{
UserName: "testuser",
Name: "mykey",
Type: "rsa",
Size: 2048,
NetworkName: "public",
CreditCost: 0},
); err != nil {
t.Fatal(err)
}
cfg.Services.Krab.TLS.CertPath = "/root"
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, &sync.WaitGroup{}, db, cfg); err == nil {
t.Fatal("expected error")
}
}
func TestQueue_IPFSPin_Failure_RabbitMQ(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpfsPinQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
cfg.RabbitMQ.URL = "notarealurl"
// we don't need time-out since this test will automatically fail
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, &sync.WaitGroup{}, db, cfg); err == nil {
t.Fatal("expected error")
}
}
func TestQueue_IPFSPin_Failure_LogFile(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpfsPinQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
cfg.LogDir = "/root/toor"
// we don't need time-out since this test will automatically fail
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, &sync.WaitGroup{}, db, cfg); err == nil {
t.Fatal("expected error")
}
}
func TestQueue_IPNSEntry_Failure_Krab(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
db, err := loadDatabase(cfg)
if err != nil {
t.Fatal(err)
}
loggerConsumer := zaptest.NewLogger(t).Sugar()
// setup our queue backend
qmConsumer, err := New(IpnsEntryQueue, testRabbitAddress, false, dev, cfg, loggerConsumer)
if err != nil {
t.Fatal(err)
}
cfg.Services.Krab.TLS.CertPath = "/root/toor"
// we don't need time-out since this test will automatically fail
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
if err = qmConsumer.ConsumeMessages(ctx, &sync.WaitGroup{}, db, cfg); err == nil {
t.Fatal(err)
}
}
func TestQueue_Bad_TLS_Config_CACertFile(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
logger := zaptest.NewLogger(t).Sugar()
cfg.RabbitMQ.TLSConfig.CACertFile = "../README.md"
if _, err := New(IpnsEntryQueue, cfg.RabbitMQ.URL, false, dev, cfg, logger); err == nil {
t.Fatal("expected error")
}
cfg.RabbitMQ.TLSConfig.CACertFile = "/root/toor"
if _, err := New(IpnsEntryQueue, cfg.RabbitMQ.URL, false, dev, cfg, logger); err == nil {
t.Fatal("expected error")
}
}
func loadDatabase(cfg *config.TemporalConfig) (*gorm.DB, error) {
dbm, err := database.New(cfg, database.Options{SSLModeDisable: true})
if err != nil {
return nil, err
}
return dbm.DB, nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/ipfs.go | queue/ipfs.go | package queue
import (
"context"
"encoding/json"
"errors"
"fmt"
"strings"
"sync"
"time"
kaas "github.com/RTradeLtd/kaas/v2"
"github.com/RTradeLtd/rtfs/v2"
"github.com/RTradeLtd/database/v2/models"
"github.com/jinzhu/gorm"
"github.com/streadway/amqp"
"go.bobheadxi.dev/zapx/zapx"
pb "github.com/RTradeLtd/grpc/krab"
ci "github.com/libp2p/go-libp2p-core/crypto"
peer "github.com/libp2p/go-libp2p-core/peer"
)
// ProcessIPFSKeyCreation is used to create IPFS keys
func (qm *Manager) ProcessIPFSKeyCreation(ctx context.Context, wg *sync.WaitGroup, msgs <-chan amqp.Delivery) error {
kbPrimary, err := kaas.NewClient(qm.cfg.Services, false)
if err != nil {
return err
}
var kbBackup *kaas.Client
if !qm.dev {
kbBackup, err = kaas.NewClient(qm.cfg.Services, true)
if err != nil {
return err
}
}
userManager := models.NewUserManager(qm.db)
qm.l.Info("processing ipfs key creation requests")
for {
select {
case d := <-msgs:
wg.Add(1)
go qm.processIPFSKeyCreation(d, wg, kbPrimary, kbBackup, userManager)
case <-ctx.Done():
qm.Close()
wg.Done()
return nil
case msg := <-qm.ErrCh:
qm.Close()
wg.Done()
qm.l.Errorw(
"a protocol connection error stopping rabbitmq was received",
"error", msg.Error())
return errors.New(ErrReconnect)
}
}
}
// ProccessIPFSPins is used to process IPFS pin requests
func (qm *Manager) ProccessIPFSPins(ctx context.Context, wg *sync.WaitGroup, msgs <-chan amqp.Delivery) error {
userManager := models.NewUserManager(qm.db)
networkManager := models.NewHostedNetworkManager(qm.db)
uploadManager := models.NewUploadManager(qm.db)
// TODO: new loggers should not be instantiated here
logger, err := zapx.New(qm.cfg.LogDir+"cluster_publisher.log", false)
if err != nil {
return err
}
// initialize a connection to the cluster pin queue so we can trigger pinning of this content to our cluster
qmCluster, err := New(IpfsClusterPinQueue, qm.cfg.RabbitMQ.URL, true, dev, qm.cfg, logger.Sugar())
if err != nil {
qm.l.Errorw("failed to intialize cluster pin queue connection", "error", err.Error())
return err
}
ipfsManager, err := rtfs.NewManager(qm.cfg.IPFS.APIConnection.Host+":"+qm.cfg.IPFS.APIConnection.Port, "", time.Minute*60)
if err != nil {
qm.l.Errorw("failed to initialize connection to ipfs", "error", err.Error())
return err
}
qm.l.Info("processing ipfs pins")
for {
select {
case d := <-msgs:
wg.Add(1)
go qm.processIPFSPin(d, wg, userManager, networkManager, uploadManager, qmCluster, ipfsManager)
case <-ctx.Done():
qm.Close()
wg.Done()
return nil
case msg := <-qm.ErrCh:
qm.Close()
wg.Done()
qm.l.Errorw(
"a protocol connection error stopping rabbitmq was received",
"error", msg.Error())
return errors.New(ErrReconnect)
}
}
}
func (qm *Manager) processIPFSPin(d amqp.Delivery, wg *sync.WaitGroup, usrm *models.UserManager, nm *models.HostedNetworkManager, upldm *models.UploadManager, qmCluster *Manager, ipfsManager *rtfs.IpfsManager) {
defer wg.Done()
qm.l.Info("new pin request detected")
pin := &IPFSPin{}
if err := json.Unmarshal(d.Body, pin); err != nil {
qm.l.Errorw("failed to unmarshal message", "error", err.Error())
d.Ack(false)
return
}
// check whether or not this pin is for a private network
// if it is, verify whether the user has acess to the network, and retrieve the api url
if pin.NetworkName != "public" {
canAccess, err := usrm.CheckIfUserHasAccessToNetwork(pin.UserName, pin.NetworkName)
if err != nil {
qm.l.Errorw("failed to lookup private network in database", "error", err.Error())
d.Ack(false)
return
}
if !canAccess {
qm.l.Errorw(
"unauthorized private network access",
"error", errors.New("user does not have access to private network").Error(),
"user", pin.UserName)
d.Ack(false)
return
}
apiURL := fmt.Sprintf("%s/network/%s/api", qm.cfg.Nexus.Host+":"+qm.cfg.Nexus.Delegator.Port, pin.NetworkName)
// connect to ipfs
ipfsManager, err = rtfs.NewManager(apiURL, pin.JWT, time.Minute*60)
if err != nil {
qm.l.Infow(
"failed to initialize connection to ipfs",
"error", err.Error(),
"user", pin.UserName,
"network", pin.NetworkName)
d.Ack(false)
return
}
}
qm.l.Infow(
"initializing connection to ipfs",
"user", pin.UserName)
qm.l.Infow(
"pinning hash to ipfs",
"cid", pin.CID,
"user", pin.UserName,
"network", pin.NetworkName)
// pin the content
if err := ipfsManager.Pin(pin.CID); err != nil {
if pin.NetworkName == "public" {
qm.refundCredits(pin.UserName, "pin", pin.CreditCost)
}
models.NewUsageManager(qm.db).ReduceDataUsage(pin.UserName, uint64(pin.Size))
qm.l.Errorw(
"failed to pin hash to ipfs",
"error", err.Error(),
"user", pin.UserName,
"network", pin.NetworkName)
d.Ack(false)
return
}
// cluster support for private networks isn't available yet
// as such, skip additional processing for cluster pins
qm.l.Infof(
"successfully process pin request",
"user", pin.UserName,
"network", pin.NetworkName)
upload, err := upldm.FindUploadByHashAndUserAndNetwork(pin.UserName, pin.CID, pin.NetworkName)
if err != nil && err != gorm.ErrRecordNotFound {
qm.l.Errorw(
"fail to check database for upload",
"error", err.Error(),
"user", pin.UserName)
d.Ack(false)
return
}
// check whether or not we have seen this content hash before to determine how database needs to be updated
if upload == nil {
_, err = upldm.NewUpload(pin.CID, "pin", models.UploadOptions{
NetworkName: pin.NetworkName,
Username: pin.UserName,
HoldTimeInMonths: pin.HoldTimeInMonths,
FileName: pin.FileName,
Size: pin.Size})
} else {
// the record already exists so we will update
_, err = upldm.UpdateUpload(pin.HoldTimeInMonths, pin.UserName, pin.CID, pin.NetworkName)
}
// validate whether or not the database was updated properly
if err != nil {
qm.l.Errorw(
"failed to update database",
"error", err.Error(),
"user", pin.UserName)
}
d.Ack(false)
}
func (qm *Manager) processIPFSKeyCreation(d amqp.Delivery, wg *sync.WaitGroup, kbPrimary *kaas.Client, kbBackup *kaas.Client, um *models.UserManager) {
defer wg.Done()
qm.l.Info("new key creation request detected")
key := IPFSKeyCreation{}
if err := json.Unmarshal(d.Body, &key); err != nil {
qm.l.Errorw(
"failed to unmarshal message",
"error", err.Error())
d.Ack(false)
return
}
// to prevent key name collision, we need to ensure that the keyname was prefixed with their username and a hyphen
// whenever a user creates a key, the API call will prepend their username and a hyphen before sending the message for processing
// this check ensures that the key was properly prefixed
if strings.Split(key.Name, "-")[0] != key.UserName {
qm.l.Errorf("invalid key name %s, must be prefixed with: %s-", key.Name, key.UserName)
d.Ack(false)
return
}
var (
keyTypeInt int
bitsInt int
)
// validate the key parameters used for creation
switch key.Type {
case "rsa":
keyTypeInt = ci.RSA
// ensure the provided key size is within a valid range, otherwise default to 2048
if key.Size > 4096 || key.Size < 2048 {
bitsInt = 2048
} else {
bitsInt = key.Size
}
case "ed25519":
keyTypeInt = ci.Ed25519
// ed25519 keys use 256 bits, so regardless of what the user provides for bit size, hard set 256
bitsInt = 256
default:
qm.l.Errorw(
"invalid key type for creation request",
"error", fmt.Errorf("key must be ed25519 or rsa, not %s", key.Type),
"user", key.UserName,
"key_name", key.Name)
d.Ack(false)
return
}
// generate the appropriate keypair
pk, _, err := ci.GenerateKeyPair(keyTypeInt, bitsInt)
if err != nil {
qm.l.Errorw(
"failed to create key",
"error", err.Error(),
"user", key.UserName,
"key_name", key.Name)
d.Ack(false)
return
}
// retrieve a human friendly format, also verifying the key is a valid ipfs key
id, err := peer.IDFromPrivateKey(pk)
if err != nil {
qm.l.Errorw(
"failed to get peer id from private key",
"error", err.Error(),
"user", key.UserName,
"Key_name", key.Name)
d.Ack(false)
return
}
// convert the key to bytes to send to krab for processing
pkBytes, err := pk.Bytes()
if err != nil {
qm.l.Errorw(
"failed to marshal key to bytes",
"error", err.Error(),
"user", key.UserName,
"key_name", key.Name)
d.Ack(false)
return
}
// store the key in local krab
if _, err := kbPrimary.PutPrivateKey(context.Background(), &pb.KeyPut{Name: key.Name, PrivateKey: pkBytes}); err != nil {
qm.l.Errorw(
"failed to store key in primary krab",
"error", err.Error(),
"user", key.UserName,
"key_name", key.Name)
d.Ack(false)
return
}
if !qm.dev {
// store the key in remote krab
// dont fail on fallback
if _, err := kbBackup.PutPrivateKey(context.Background(), &pb.KeyPut{Name: key.Name, PrivateKey: pkBytes}); err != nil {
qm.l.Warnw(
"failed to store key in krab",
"error", err.Error(),
"user", key.UserName,
"key_name", key.Name)
}
}
// doesn't need a refund, key was generated and stored in our keystore, but information not saved to db
if err := um.AddIPFSKeyForUser(key.UserName, key.Name, id.Pretty()); err != nil {
qm.l.Errorw(
"failed to update database",
"error", err.Error(),
"user", key.UserName,
"key_name", key.Name)
} else {
qm.l.Infow(
"successfully processed key creation request",
"user", key.UserName,
"key_name", key.Name)
}
d.Ack(false)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/log_test.go | queue/log_test.go | package queue
import (
"testing"
"github.com/RTradeLtd/config/v2"
"go.uber.org/zap"
"go.uber.org/zap/zaptest/observer"
)
func TestLog_Publisher(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
observer, out := observer.New(zap.InfoLevel)
logger := zap.New(observer).Sugar()
_, err = New(IpfsClusterPinQueue, cfg.RabbitMQ.URL, true, dev, cfg, logger)
if err != nil {
t.Fatal(err)
}
if out.All()[out.Len()-1].Message != "channel opened" {
t.Fatal("failed to recover correct message")
}
}
func TestLog_Consumer(t *testing.T) {
dev = true
cfg, err := config.LoadConfig(testCfgPath)
if err != nil {
t.Fatal(err)
}
observer, out := observer.New(zap.InfoLevel)
logger := zap.New(observer).Sugar()
qm, err := New(IpfsClusterPinQueue, cfg.RabbitMQ.URL, false, dev, cfg, logger)
if err != nil {
t.Fatal(err)
}
if out.All()[out.Len()-1].Message != "queue declared" {
t.Fatal("failed to recover correct message")
}
if err = qm.Close(); err != nil {
t.Fatal(err)
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/types.go | queue/types.go | package queue
import (
"time"
"github.com/RTradeLtd/config/v2"
"github.com/jinzhu/gorm"
"go.uber.org/zap"
"github.com/streadway/amqp"
)
// Various variables and types used by our queue package
// Queue is a typed string used to declare the various queue names
type Queue string
func (qt Queue) String() string {
return string(qt)
}
var (
dev = false
// ENSRequestQueue is a queue used to handle ens requests
ENSRequestQueue Queue = "ens-request-queue"
// IpfsPinQueue is a queue used for ipfs pins
IpfsPinQueue Queue = "ipfs-pin-queue"
// IpfsClusterPinQueue is a queue used for ipfs cluster pins
IpfsClusterPinQueue Queue = "ipfs-cluster-add-queue"
// EmailSendQueue is a queue used to handle sending email messages
EmailSendQueue Queue = "email-send-queue"
// IpnsEntryQueue is a queue used to handle ipns entry creation
IpnsEntryQueue Queue = "ipns-entry-queue"
// IpfsKeyCreationQueue is a queue used to handle ipfs key creation
IpfsKeyCreationQueue Queue = "ipfs-key-creation-queue"
// EthPaymentConfirmationQueue is a queue used to handle ethereum based payment confirmations
EthPaymentConfirmationQueue Queue = "eth-payment-confirmation-queue"
// DashPaymentConfirmationQueue is a queue used to handle confirming dash payments
DashPaymentConfirmationQueue Queue = "dash-payment-confirmation-queue"
// BitcoinCashPaymentConfirmationQueue is a queue used to handle confirming bitcoin cash payments
BitcoinCashPaymentConfirmationQueue Queue = "bitcoin-cash-payment-confirmation-queue"
// AdminEmail is the email used to notify RTrade about any critical errors
AdminEmail = "temporal.reports@rtradetechnologies.com"
// IpfsPinFailedContent is a to-be formatted message sent on IPFS pin failures
IpfsPinFailedContent = "Pin failed for content hash %s on IPFS network %s, for reason %s"
// IpfsPinFailedSubject is a subject for IPFS pin failed messages
IpfsPinFailedSubject = "IPFS Pin Failed"
// IpfsFileFailedContent is a to be formatted message sent on ipfs add failures
IpfsFileFailedContent = "IPFS File Add Failed for object name %s on IPFS network %s"
// IpfsFileFailedSubject is a subject for ipfs file add fails
IpfsFileFailedSubject = "IPFS File Add Failed"
// IpfsPrivateNetworkUnauthorizedSubject is a subject whenever someone tries to access a bad private network
IpfsPrivateNetworkUnauthorizedSubject = "Unauthorized access to IPFS private network"
// IpfsInitializationFailedSubject is a subject used when connecting to ipfs fails
IpfsInitializationFailedSubject = "Connection to IPFS failed"
// IpnsEntryFailedSubject is a subject sent upon IPNS failures
IpnsEntryFailedSubject = "IPNS Entry Creation Failed"
// IpnsEntryFailedContent is the content used when sending an email for IPNS entry creation failures
IpnsEntryFailedContent = "IPNS Entry creation failed for content hash %s using key %s for reason %s"
// PaymentConfirmationFailedSubject is a subject used when payment confirmations fail
PaymentConfirmationFailedSubject = "Payment Confirmation Failed"
// PaymentConfirmationFailedContent is a content used when a payment confirmation failure occurs
PaymentConfirmationFailedContent = "Payment failed for content hash %s with error %s"
// ErrReconnect is an error emitted when a protocol connection error occurs
// It is used to signal reconnect of queue consumers and publishers
ErrReconnect = "protocol connection error, reconnect"
)
// Manager is a helper struct to interact with rabbitmq
type Manager struct {
connection *amqp.Connection
channel *amqp.Channel
queue *amqp.Queue
l *zap.SugaredLogger
db *gorm.DB
cfg *config.TemporalConfig
ErrCh chan *amqp.Error
QueueName Queue
ExchangeName string
dev bool
}
// Queue Messages - These are used to format messages to send through rabbitmq
// IPFSKeyCreation is a message used for processing key creation
// only supported for the public IPFS network at the moment
type IPFSKeyCreation struct {
UserName string `json:"user_name"`
Name string `json:"name"`
Type string `json:"type"`
Size int `json:"size"`
NetworkName string `json:"network_name"`
CreditCost float64 `json:"credit_cost"`
}
// IPFSPin is a struct used when sending pin request
type IPFSPin struct {
CID string `json:"cid"`
NetworkName string `json:"network_name"`
UserName string `json:"user_name"`
HoldTimeInMonths int64 `json:"hold_time_in_months"`
CreditCost float64 `json:"credit_cost"`
Size int64 `json:"size"`
JWT string `json:"jwt,omitempty"`
FileName string `json:"file_name,omitempty"`
}
// IPFSClusterPin is a queue message used when sending a message to the cluster to pin content
type IPFSClusterPin struct {
CID string `json:"cid"`
NetworkName string `json:"network_name"`
UserName string `json:"user_name"`
HoldTimeInMonths int64 `json:"hold_time_in_months"`
Size int64 `json:"size"`
CreditCost float64 `json:"credit_cost"`
FileName string `json:"file_name,omitempty"`
}
// IPNSUpdate is our message for the ipns update queue
type IPNSUpdate struct {
CID string `json:"content_hash"`
IPNSHash string `json:"ipns_hash"`
LifeTime string `json:"life_time"`
TTL string `json:"ttl"`
Key string `json:"key"`
Resolve bool `json:"resolve"`
UserName string `json:"user_name"`
NetworkName string `json:"network_name"`
CreditCost float64 `json:"credit_cost"`
}
// EmailSend is a helper struct used to contained formatted content ot send as an email
type EmailSend struct {
Subject string `json:"subject"`
Content string `json:"content"`
ContentType string `json:"content_type"`
UserNames []string `json:"user_names"`
Emails []string `json:"emails,omitempty"`
}
// IPNSEntry is used to hold relevant information needed to process IPNS entry creation requests
type IPNSEntry struct {
CID string `json:"cid"`
LifeTime time.Duration `json:"life_time"`
TTL time.Duration `json:"ttl"`
Resolve bool `json:"resolve"`
Key string `json:"key"`
UserName string `json:"user_name"`
NetworkName string `json:"network_name"`
CreditCost float64 `json:"credit_cost"`
}
// DashPaymenConfirmation is a message used to signal processing of a dash payment
type DashPaymenConfirmation struct {
UserName string `json:"user_name"`
PaymentForwardID string `json:"payment_forward_id"`
PaymentNumber int64 `json:"payment_number"`
}
// EthPaymentConfirmation is a message used to confirm an ethereum based payment
type EthPaymentConfirmation struct {
UserName string `json:"user_name"`
PaymentNumber int64 `json:"payment_number"`
}
// BchPaymentConfirmation is used to confirm a bitcoin cash based payment
type BchPaymentConfirmation struct {
UserName string `json:"user_name"`
PaymentNumber int64 `json:"payment_number"`
}
// ENSRequestType denotes a particular request type
type ENSRequestType string
func (ert ENSRequestType) String() string {
return string(ert)
}
const (
// ENSRegisterName is a name registration request message
ENSRegisterName = ENSRequestType("register-name")
// ENSRegisterSubName is a subdomain name registration request message
ENSRegisterSubName = ENSRequestType("regsiter-sub-name")
// ENSUpdateContentHash is used to update the content hash for a record
ENSUpdateContentHash = ENSRequestType("update-content-hash")
)
// ENSRequest is used to process an ens api request
type ENSRequest struct {
Type ENSRequestType `json:"type"`
UserName string `json:"user_name"`
ContentHash string `json:"content_hash"`
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/utils.go | queue/utils.go | package queue
import (
"github.com/RTradeLtd/database/v2/models"
)
// refundCredits is used to refund a users credits. We do not check for errors,
// as these are logged and manually corrected if they occur
func (qm *Manager) refundCredits(username, callType string, cost float64) error {
if cost == 0 {
return nil
}
um := models.NewUserManager(qm.db)
if _, err := um.AddCredits(username, cost); err != nil {
qm.l.Errorw(
"failed to refund user credits",
"error", err.Error(),
"user", username,
"call_type", callType,
"cost", cost)
return err
}
return nil
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/ipns.go | queue/ipns.go | package queue
import (
"context"
"encoding/json"
"errors"
"sync"
"time"
ci "github.com/libp2p/go-libp2p-core/crypto"
peer "github.com/libp2p/go-libp2p-core/peer"
"github.com/streadway/amqp"
"github.com/RTradeLtd/database/v2/models"
pb "github.com/RTradeLtd/grpc/krab"
kaas "github.com/RTradeLtd/kaas/v2"
"github.com/RTradeLtd/rtns"
datastore "github.com/ipfs/go-datastore"
dssync "github.com/ipfs/go-datastore/sync"
badger "github.com/ipfs/go-ds-badger"
"github.com/multiformats/go-multiaddr"
)
type contextKey string
const (
ipnsPublishTTL contextKey = "ipns-publish-ttl"
)
func (qm *Manager) getPublisherKey(ctx context.Context, kb *kaas.Client) (ci.PrivKey, error) {
// generate a temporary key if we have not specified a key name
if qm.cfg.Services.RTNS.KeyName == "" {
qm.l.Info("using a temporary publisher identity")
pk, _, err := ci.GenerateKeyPair(ci.Ed25519, 256)
return pk, err
}
qm.l.Info("using a persistent publisher identity")
resp, err := kb.GetPrivateKey(ctx, &pb.KeyGet{Name: qm.cfg.Services.RTNS.KeyName})
if err != nil {
return nil, err
}
return ci.UnmarshalPrivateKey(resp.GetPrivateKey())
}
func (qm *Manager) getDatastore() (datastore.Batching, error) {
if qm.dev || qm.cfg.Services.RTNS.DatastorePath == "" {
qm.l.Info("using map datastore")
return dssync.MutexWrap(datastore.NewMapDatastore()), nil
}
qm.l.Info("using badger datastore")
return badger.NewDatastore(qm.cfg.Services.RTNS.DatastorePath, &badger.DefaultOptions)
}
// ProcessIPNSEntryCreationRequests is used to process IPNS entry creation requests
func (qm *Manager) ProcessIPNSEntryCreationRequests(ctx context.Context, wg *sync.WaitGroup, msgs <-chan amqp.Delivery) error {
kbPrimary, err := kaas.NewClient(qm.cfg.Services, false)
if err != nil {
return err
}
kbBackup, err := kaas.NewClient(qm.cfg.Services, true)
if err != nil {
return err
}
pubPK, err := qm.getPublisherKey(ctx, kbPrimary)
if err != nil {
return err
}
addr, err := multiaddr.NewMultiaddr("/ip4/0.0.0.0/tcp/3999")
if err != nil {
return err
}
pid, err := peer.IDFromPublicKey(pubPK.GetPublic())
if err != nil {
return err
}
ds, err := qm.getDatastore()
if err != nil {
return err
}
qm.l.Infof("usering peerid of %s for publisher", pid.String())
rConfig := rtns.Config{
PK: pubPK,
ListenAddrs: []multiaddr.Multiaddr{addr},
Datastore: ds,
}
publisher, err := rtns.NewService(ctx, kbPrimary, rConfig)
if err != nil {
return err
}
publisher.Bootstrap(publisher.DefaultBootstrapPeers())
ipnsManager := models.NewIPNSManager(qm.db)
qm.l.Info("processing ipns entry creation requests")
for {
select {
case d := <-msgs:
wg.Add(1)
go qm.processIPNSEntryCreationRequest(ctx, d, wg, kbBackup, ipnsManager, publisher)
case <-ctx.Done():
qm.Close()
wg.Done()
return nil
case msg := <-qm.ErrCh:
qm.Close()
wg.Done()
publisher.Close()
qm.l.Errorw(
"a protocol connection error stopping rabbitmq was received",
"error", msg.Error())
return errors.New(ErrReconnect)
}
}
}
func (qm *Manager) processIPNSEntryCreationRequest(ctx context.Context, d amqp.Delivery, wg *sync.WaitGroup, kbBackup *kaas.Client, im *models.IpnsManager, pub rtns.Service) {
defer wg.Done()
qm.l.Info("new ipns entry creation detected")
ie := IPNSEntry{}
if err := json.Unmarshal(d.Body, &ie); err != nil {
qm.l.Errorw(
"failed to unmarshal message",
"error", err.Error())
d.Ack(false)
return
}
// temporarily do not process ipns creation requests for non public networks
if ie.NetworkName != "public" {
qm.l.Errorw(
"private networks not supported for ipns",
"user", ie.UserName)
d.Ack(false)
return
}
qm.l.Infow(
"publishing ipns entry",
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID)
var cache bool
// first attempt to retrieve private key
// from the primary krab keystore which
// is embedded into the RTNS publisher
pk, err := pub.GetKey(ie.Key)
if err != nil {
// do not cache entries if the key is not available in the primary keystore
cache = false
qm.l.Warnw(
"failed to retrieve private key from priamry krab, attempting backup",
"error", err.Error(),
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID,
)
if !qm.dev {
var errCheck error
resp, errCheck := kbBackup.GetPrivateKey(context.Background(), &pb.KeyGet{Name: ie.Key})
if errCheck != nil {
qm.refundCredits(ie.UserName, "ipns", ie.CreditCost)
qm.l.Errorw(
"failed to retrieve private key from backup krab",
"error", err.Error(),
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID)
d.Ack(false)
return
}
pk, err = ci.UnmarshalPrivateKey(resp.GetPrivateKey())
if err != nil {
qm.refundCredits(ie.UserName, "ipns", ie.CreditCost)
qm.l.Errorw(
"failed to unmarshal private key",
"error", err.Error(),
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID)
d.Ack(false)
return
}
} else {
qm.l.Errorw(
"primary krab key retrieval failure, with dev mode disabled, aborting",
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID,
)
d.Ack(false)
return
}
} else {
// only cache entries whose key is available via the primary keystore
cache = true
}
// Note: context is used to pass in the experimental ttl value
// see https://discuss.ipfs.io/t/clarification-over-ttl-and-lifetime-for-ipns-records/4346 for more information
cctx := context.WithValue(ctx, ipnsPublishTTL, ie.TTL)
eol := time.Now().Add(ie.LifeTime)
if err := pub.PublishWithEOL(cctx, pk, eol, cache, ie.Key, ie.CID); err != nil {
qm.refundCredits(ie.UserName, "ipns", ie.CreditCost)
qm.l.Errorw(
"failed to publish ipns entry",
"error", err.Error(),
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID)
d.Ack(false)
return
}
// retrieve the peer id from the private key used to resolve the IPNS record
id, err := peer.IDFromPrivateKey(pk)
if err != nil {
// do not refund here since the record is published
qm.l.Errorw(
"failed to unmarshal peer identity private key",
"error", err.Error(),
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID)
d.Ack(false)
return
}
// determine whether or not this ipns has been used, if so update record, otherwise create new one
if _, err = im.FindByIPNSHash(id.Pretty()); err != nil {
_, err = im.CreateEntry(id.Pretty(), ie.CID, ie.Key, ie.NetworkName, ie.UserName, ie.LifeTime, ie.TTL)
} else {
_, err = im.UpdateIPNSEntry(id.Pretty(), ie.CID, ie.NetworkName, ie.UserName, ie.LifeTime, ie.TTL)
}
if err != nil {
qm.l.Errorw(
"failed to update ipns entry in database",
"error", err.Error(),
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID)
} else {
qm.l.Infow(
"successfully processed ipns entry creation request",
"user", ie.UserName,
"key", ie.Key,
"cid", ie.CID)
}
d.Ack(false)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/ipfs_cluster.go | queue/ipfs_cluster.go | package queue
import (
"context"
"encoding/json"
"errors"
"sync"
"github.com/RTradeLtd/Temporal/rtfscluster"
"github.com/RTradeLtd/database/v2/models"
"github.com/jinzhu/gorm"
"github.com/streadway/amqp"
)
// ProcessIPFSClusterPins is used to process messages sent to rabbitmq requesting be pinned to our cluster
func (qm *Manager) ProcessIPFSClusterPins(ctx context.Context, wg *sync.WaitGroup, msgs <-chan amqp.Delivery) error {
clusterManager, err := rtfscluster.Initialize(ctx, qm.cfg.IPFSCluster.APIConnection.Host, qm.cfg.IPFSCluster.APIConnection.Port)
if err != nil {
return err
}
uploadManager := models.NewUploadManager(qm.db)
qm.l.Info("processing ipfs cluster pin requests")
for {
select {
case d := <-msgs:
wg.Add(1)
go qm.processIPFSClusterPin(ctx, d, wg, clusterManager, uploadManager)
case <-ctx.Done():
qm.Close()
wg.Done()
return nil
case msg := <-qm.ErrCh:
qm.Close()
wg.Done()
qm.l.Errorw(
"a protocol connection error stopping rabbitmq was received",
"error", msg.Error())
return errors.New(ErrReconnect)
}
}
}
func (qm *Manager) processIPFSClusterPin(ctx context.Context, d amqp.Delivery, wg *sync.WaitGroup, cm *rtfscluster.ClusterManager, um *models.UploadManager) {
defer wg.Done()
qm.l.Info("new cluster pin request detected")
clusterAdd := IPFSClusterPin{}
if err := json.Unmarshal(d.Body, &clusterAdd); err != nil {
qm.l.Errorw(
"failed to unmarshal message",
"error", err.Error())
d.Ack(false)
return
}
if clusterAdd.NetworkName != "public" {
qm.l.Errorw(
"private clustered networks not yet supported",
"error", errors.New("private network clusters not supported").Error(),
"cid", clusterAdd.CID,
"user", clusterAdd.UserName)
d.Ack(false)
return
}
encodedCid, err := cm.DecodeHashString(clusterAdd.CID)
if err != nil {
qm.refundCredits(clusterAdd.UserName, "pin", clusterAdd.CreditCost)
models.NewUsageManager(qm.db).ReduceDataUsage(clusterAdd.UserName, uint64(clusterAdd.Size))
qm.l.Errorw(
"bad cid format detected",
"error", err.Error(),
"cid", clusterAdd.CID,
"user", clusterAdd.UserName)
d.Ack(false)
return
}
qm.l.Infow(
"pinning hash to cluster",
"cid", clusterAdd.CID,
"user", clusterAdd.UserName)
if err = cm.Pin(ctx, encodedCid); err != nil {
_ = qm.refundCredits(clusterAdd.UserName, "pin", clusterAdd.CreditCost)
_ = models.NewUsageManager(qm.db).ReduceDataUsage(clusterAdd.UserName, uint64(clusterAdd.Size))
qm.l.Errorw(
"failed to pin hash to cluster",
"error", err.Error(),
"cid", clusterAdd.CID,
"user", clusterAdd.UserName)
d.Ack(false)
return
}
upload, err := um.FindUploadByHashAndUserAndNetwork(clusterAdd.UserName, clusterAdd.CID, clusterAdd.NetworkName)
if err != nil && err != gorm.ErrRecordNotFound {
qm.l.Errorw(
"failed to check database for upload",
"error", err.Error(),
"cid", clusterAdd.CID,
"user", clusterAdd.UserName)
d.Ack(false)
return
}
if upload == nil {
_, err = um.NewUpload(clusterAdd.CID, "pin-cluster", models.UploadOptions{
NetworkName: clusterAdd.NetworkName,
Username: clusterAdd.UserName,
HoldTimeInMonths: clusterAdd.HoldTimeInMonths,
FileName: clusterAdd.FileName,
Size: clusterAdd.Size})
} else {
_, err = um.UpdateUpload(clusterAdd.HoldTimeInMonths, clusterAdd.UserName, clusterAdd.CID, clusterAdd.NetworkName)
}
if err != nil {
qm.l.Errorw(
"failed to update database",
"error", err.Error(),
"cid", clusterAdd.CID,
"user", clusterAdd.UserName)
} else {
qm.l.Infow(
"successfully processed cluster pin request",
"cid", clusterAdd.CID,
"user", clusterAdd.UserName)
}
d.Ack(false)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/mail.go | queue/mail.go | package queue
import (
"context"
"encoding/json"
"errors"
"sync"
"github.com/RTradeLtd/Temporal/mail"
"github.com/jinzhu/gorm"
"github.com/streadway/amqp"
)
// ProcessMailSends is a function used to process mail send queue messages
func (qm *Manager) ProcessMailSends(ctx context.Context, wg *sync.WaitGroup, db *gorm.DB, msgs <-chan amqp.Delivery) error {
mm, err := mail.NewManager(qm.cfg, db)
if err != nil {
return err
}
qm.l.Info("processing email send requests")
for {
select {
case d := <-msgs:
wg.Add(1)
go qm.processMailSend(d, wg, mm)
case <-ctx.Done():
qm.Close()
wg.Done()
return nil
case msg := <-qm.ErrCh:
qm.Close()
wg.Done()
qm.l.Errorw(
"a protocol connection error stopping rabbitmq was received",
"error", msg.Error())
return errors.New(ErrReconnect)
}
}
}
func (qm *Manager) processMailSend(d amqp.Delivery, wg *sync.WaitGroup, mm *mail.Manager) {
defer wg.Done()
qm.l.Info("new email send request detected")
es := EmailSend{}
if err := json.Unmarshal(d.Body, &es); err != nil {
qm.l.Errorw(
"failed to unmarshal message",
"error", err.Error())
d.Ack(false)
return
}
for k, v := range es.Emails {
_, err := mm.SendEmail(es.Subject, es.Content, es.ContentType, es.UserNames[k], v)
if err != nil {
qm.l.Errorw(
"failed to send email",
"error", err.Error(),
"email", v,
"user", es.UserNames[k])
}
qm.l.Infow(
"email sent",
"email", v,
"user", es.UserNames[k])
}
d.Ack(false)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/doc.go | queue/doc.go | // Package queue implements Temporal's various queue consumers and publishers
package queue
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/queue/queue.go | queue/queue.go | package queue
import (
"context"
"crypto/tls"
"crypto/x509"
"encoding/json"
"errors"
"io/ioutil"
"sync"
"github.com/jinzhu/gorm"
"go.uber.org/zap"
"github.com/RTradeLtd/config/v2"
"github.com/streadway/amqp"
)
// New is used to instantiate a new connection to rabbitmq as a publisher or consumer
func New(queue Queue, url string, publish, devMode bool, cfg *config.TemporalConfig, logger *zap.SugaredLogger) (*Manager, error) {
conn, err := setupConnection(url, cfg)
if err != nil {
return nil, err
}
var queueType string
if publish {
queueType = "publish"
} else {
queueType = "consumer"
}
// create base queue manager
qm := Manager{connection: conn, QueueName: queue, l: logger.Named(queue.String() + "." + queueType), dev: devMode}
// open a channel
if err := qm.openChannel(); err != nil {
return nil, err
}
// if we aren't publishing, and are consuming
// setup a queue to receive messages on
if !publish {
if err = qm.declareQueue(); err != nil {
return nil, err
}
}
// register err channel notifier
qm.RegisterConnectionClosure()
return &qm, nil
}
func setupConnection(connectionURL string, cfg *config.TemporalConfig) (*amqp.Connection, error) {
switch cfg.RabbitMQ.TLSConfig.CACertFile {
case "":
return amqp.Dial(connectionURL)
default:
// see https://godoc.org/github.com/streadway/amqp#DialTLS for more information
tlsConfig := new(tls.Config)
tlsConfig.RootCAs = x509.NewCertPool()
ca, err := ioutil.ReadFile(cfg.RabbitMQ.TLSConfig.CACertFile)
if err != nil {
return nil, err
}
if !tlsConfig.RootCAs.AppendCertsFromPEM(ca) {
return nil, errors.New("failed to successfully append cert file")
}
cert, err := tls.LoadX509KeyPair(cfg.RabbitMQ.TLSConfig.CertFile, cfg.RabbitMQ.TLSConfig.KeyFile)
if err != nil {
return nil, err
}
tlsConfig.Certificates = append(tlsConfig.Certificates, cert)
return amqp.DialTLS(connectionURL, tlsConfig)
}
}
// OpenChannel is used to open a channel to the rabbitmq server
func (qm *Manager) openChannel() error {
ch, err := qm.connection.Channel()
if err != nil {
return err
}
qm.l.Info("channel opened")
qm.channel = ch
return qm.channel.Qos(10, 0, false)
}
// DeclareQueue is used to declare a queue for which messages will be sent to
func (qm *Manager) declareQueue() error {
// we declare the queue as durable so that even if rabbitmq server stops
// our messages won't be lost
q, err := qm.channel.QueueDeclare(
qm.QueueName.String(), // name
true, // durable
false, // delete when unused
false, // exclusive
false, // no-wait
nil, // arguments
)
if err != nil {
return err
}
qm.l.Info("queue declared")
qm.queue = &q
return nil
}
// ConsumeMessages is used to consume messages that are sent to the queue
// Question, do we really want to ack messages that fail to be processed?
// Perhaps the error was temporary, and we allow it to be retried?
func (qm *Manager) ConsumeMessages(ctx context.Context, wg *sync.WaitGroup, db *gorm.DB, cfg *config.TemporalConfig) error {
// embed database into queue manager
qm.db = db
// embed config into queue manager
qm.cfg = cfg
// we do not auto-ack, as if a consumer dies we don't want the message to be lost
// not specifying the consumer name uses an automatically generated id
msgs, err := qm.channel.Consume(
qm.QueueName.String(), // queue
"", // consumer
false, // auto-ack
false, // exclusive
false, // no-local
false, // no-wait
nil, // args
)
if err != nil {
return err
}
// check the queue name
switch qm.QueueName {
case IpfsKeyCreationQueue:
return qm.ProcessIPFSKeyCreation(ctx, wg, msgs)
case IpfsPinQueue:
return qm.ProccessIPFSPins(ctx, wg, msgs)
case EmailSendQueue:
return qm.ProcessMailSends(ctx, wg, db, msgs)
case IpnsEntryQueue:
return qm.ProcessIPNSEntryCreationRequests(ctx, wg, msgs)
case IpfsClusterPinQueue:
return qm.ProcessIPFSClusterPins(ctx, wg, msgs)
default:
return errors.New("invalid queue name")
}
}
// PublishMessage is used to produce messages that are sent to the queue, with a worker queue (one consumer)
func (qm *Manager) PublishMessage(body interface{}) error {
bodyMarshaled, err := json.Marshal(body)
if err != nil {
return err
}
if err = qm.channel.Publish(
"", // exchange - this is left empty, and becomes the default exchange
qm.QueueName.String(), // routing key
false, // mandatory
false, // immediate
amqp.Publishing{
DeliveryMode: amqp.Persistent, // messages will persist through crashes, etc..
ContentType: "text/plain",
Body: bodyMarshaled,
},
); err != nil {
return err
}
return nil
}
// RegisterConnectionClosure is used to register a channel which we may receive
// connection level errors. This covers all channel, and connection errors.
func (qm *Manager) RegisterConnectionClosure() {
qm.ErrCh = qm.connection.NotifyClose(make(chan *amqp.Error))
}
// Close is used to close our queue resources
func (qm *Manager) Close() error {
// closing the connection also closes the channel
return qm.connection.Close()
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/log/middleware.go | log/middleware.go | package log
import (
"time"
"net/http"
"github.com/go-chi/chi/middleware"
"go.uber.org/zap"
)
type loggerMiddleware struct {
l *zap.Logger
}
// NewMiddleware instantiates a middleware function that logs all requests
// using the provided logger
func NewMiddleware(l *zap.SugaredLogger) func(next http.Handler) http.Handler {
return loggerMiddleware{l.Desugar()}.Handler
}
func (z loggerMiddleware) Handler(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
start := time.Now()
ww := middleware.NewWrapResponseWriter(w, r.ProtoMajor)
next.ServeHTTP(ww, r)
latency := time.Since(start)
var requestID string
if reqID := r.Context().Value(middleware.RequestIDKey); reqID != nil {
requestID = reqID.(string)
}
z.l.Info("request completed",
// request metadata
zap.String("path", r.URL.Path),
zap.String("query", r.URL.RawQuery),
zap.String("method", r.Method),
zap.String("user-agent", r.UserAgent()),
// response metadata
zap.Int("status", ww.Status()),
zap.Duration("took", latency),
// additional metadata
zap.String("real-ip", r.RemoteAddr),
zap.String("request-id", requestID))
},
)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/log/middleware_test.go | log/middleware_test.go | package log
import (
"io"
"net/http"
"net/http/httptest"
"testing"
"github.com/go-chi/chi"
"github.com/go-chi/chi/middleware"
"go.bobheadxi.dev/res"
"go.bobheadxi.dev/zapx/ztest"
)
func Test_loggerMiddleware(t *testing.T) {
type args struct {
method string
path string
body io.Reader
middlewares []func(http.Handler) http.Handler
}
tests := []struct {
name string
args args
want []string
}{
{
"GET with requestID",
args{"GET", "/", nil, []func(http.Handler) http.Handler{middleware.RequestID}},
[]string{"path", "request-id"},
},
{
"GET with realIP",
args{"GET", "/", nil, []func(http.Handler) http.Handler{middleware.RealIP}},
[]string{"path", "real-ip"},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// create bootstrapped logger and middleware
var l, out = ztest.NewObservable()
var handler = NewMiddleware(l.Sugar())
// set up mock router
m := chi.NewRouter()
m.Use(tt.args.middlewares...)
m.Use(handler)
m.Get("/", func(w http.ResponseWriter, r *http.Request) {
res.R(w, r, res.MsgOK("hello world!"))
})
// create a mock request to use
req := httptest.NewRequest(tt.args.method, "http://testing"+tt.args.path,
tt.args.body)
// serve request
m.ServeHTTP(httptest.NewRecorder(), req)
// check for desired log fields
for _, e := range out.All() {
for _, f := range tt.want {
// find field, cast as string, and check if empty
if val, _ := e.ContextMap()[f].(string); val == "" {
t.Errorf("field %s unexpectedly empty", f)
}
}
}
})
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/log/log_test.go | log/log_test.go | package log
import (
"testing"
"go.bobheadxi.dev/zapx/ztest"
)
func TestNewProcessLogger(t *testing.T) {
l, out := ztest.NewObservable()
logger := NewProcessLogger(l.Sugar(), "network_up", "id", "1234")
logger.Info("hi")
if out.All()[0].ContextMap()["network_up.id"].(string) != "1234" {
t.Error("bad logger")
}
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/log/log.go | log/log.go | package log
import (
"go.uber.org/zap"
)
// NewProcessLogger creates a new logger that sets prefixes on fields for
// logging a specific process
func NewProcessLogger(l *zap.SugaredLogger, process string, fields ...interface{}) *zap.SugaredLogger {
args := make([]interface{}, len(fields))
for i := 0; i < len(fields); i += 2 {
args[i] = process + "." + fields[i].(string)
args[i+1] = fields[i+1]
}
return l.With(args...)
}
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/log/doc.go | log/doc.go | // Package log provides utility functions that wrap Uber's Zap logging library
package log
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/eh/errors.go | eh/errors.go | package eh
const (
// LoginError indicates an unexpected error occurred when logging in
LoginError = "an error occurred while signing in"
// IPFSConnectionError is an error used for ipfs connection failures
IPFSConnectionError = "failed to connect to ipfs"
// PrivateNetworkAccessError is used for invalid access to private networks
PrivateNetworkAccessError = "invalid access to private network"
// APIURLCheckError is an error ussed when failing to retrieve an api url
APIURLCheckError = "failed to get api url"
// IPFSCatError is an error used when failing to can an ipfs file
IPFSCatError = "failed to execute ipfs cat"
// IPFSObjectStatError is an error used when failure to execute object stat occurs
IPFSObjectStatError = "failed to execute ipfs object stat"
// IPFSPubSubPublishError is an error message used whe nfailing to publish pubsub msgs
IPFSPubSubPublishError = "failed to publish pubsub message"
// UploadSearchError is a error used when searching for uploads fails
UploadSearchError = "failed to search for uploads in database"
// NetworkSearchError is an error used when searching for networks fail
NetworkSearchError = "faild to search for networks"
// NetworkCreationError is an error used when creating networks in database fail
NetworkCreationError = "failed to create network"
// QueueInitializationError is an error used when failing to connect to the queue
QueueInitializationError = "failed to initialize queue"
// QueuePublishError is a message used when failing to publish to queue
QueuePublishError = "failed to publish message to queue"
// KeySearchError is an error used when failing to search for a key
KeySearchError = "failed to search for key"
// KeyUseError is an error used when attempting to use a key the user down ot own
KeyUseError = "user does not own key"
// IPFSPinParseError is an error used when failure to parse ipfs pins occurs
IPFSPinParseError = "failed to parse ipfs pins"
// IPFSAddError is an error used when failing to add a file to ipfs
IPFSAddError = "failed to add file to ipfs"
// FileOpenError is an error used when failing to open a file
FileOpenError = "failed to open file"
// IPFSMultiHashGenerationError is an error used when calculating an ipfs multihash
IPFSMultiHashGenerationError = "failed to generate ipfs multihash"
// IPFSClusterStatusError is a error used when getting the status of ipfs cluster
IPFSClusterStatusError = "failed to get ipfs cluster status"
// IPFSClusterConnectionError is an error used when connecting to ipfs cluster
IPFSClusterConnectionError = "failed to connect to IPFS cluster"
// IPFSClusterPinRemovalError is an error used when failing to remove a pin from the cluster
IPFSClusterPinRemovalError = "failed to remove pin from cluster"
// DNSLinkManagerError is an error used when creating a dns link manager
DNSLinkManagerError = "failed to create dnslink manager"
// DNSLinkEntryError is an error used when creating dns link entries
DNSLinkEntryError = "failed to create dns link entry"
// PaymentCreationError is an error used when creating payments
PaymentCreationError = "failed to create payment"
// CostCalculationError is an error message emitted when we are unable to calculate the cost of something
CostCalculationError = "failed to calculate cost"
// PaymentSearchError is an error used when searching for payment
PaymentSearchError = "failed to search for payment"
// DuplicateKeyCreationError is an error used when creating a key of the same name
DuplicateKeyCreationError = "key name already exists"
// UserAccountCreationError is an error used when creating a user account
UserAccountCreationError = "failed to create user account"
// PasswordChangeError is an error used when changing your password
PasswordChangeError = "failed to change password"
// NoKeyError is an error message given to a user when they search for keys, but have none
NoKeyError = "no keys"
// FileTooBigError is an error message given to a user when attempting to upload a file larger than our limit
FileTooBigError = "attempting to upload too big of a file"
// InvalidPaymentTypeError is an error message given to a user when using an invalid payment method
InvalidPaymentTypeError = "payment type not supported, must be one of: 'eth' 'rtc' 'btc' 'ltc' 'xmr'"
// InvalidPaymentBlockchainError is an error message given to a user when they provide an invalid blockchain
InvalidPaymentBlockchainError = "blockchain must be one of: 'ethereum' 'bitcoin' 'litecoin' 'monero'"
// CreditCheckError is an error messagen given to a user when searching for their credits fails
CreditCheckError = "failed to search for user credits"
// InvalidBalanceError is an error message given to a user when they don't have enough credits to pay
InvalidBalanceError = "user does not have enough credits to pay for api call"
// CmcCheckError is an error message given to a user when checking cmc fails
CmcCheckError = "failed to retrieve value from coinmarketcap"
// DepositAddressCheckError is an error message given to a user when searching for a deposit address fails
DepositAddressCheckError = "failed to get deposit address"
// UserSearchError is an error message given to a user when a username cant be found
UserSearchError = "unable to find username"
// CreditRefundError is an error message used when we are unable to refund a users credits
CreditRefundError = "failed to refund credits for user"
// IpnsRecordSearchError is an error message given to users when we can't search for any records
IpnsRecordSearchError = "failed to search for IPNS records, user likely has published none"
// UnAuthorizedAdminAccess is an error message used whena user attempts to access an administrative route
UnAuthorizedAdminAccess = "user is not an administrator"
// DuplicateEmailError is an error used when a user attempts to register with an already taken email address
DuplicateEmailError = "email address already taken"
// DuplicateUserNameError is an error used whe na user attempts to register with an already taken user name
DuplicateUserNameError = "username is already taken"
// UnableToSaveUserError is an error that occurs when saving the user account
UnableToSaveUserError = "saving user account to database failed"
// EmailVerificationError is an error used when a user fails to validate their email address
EmailVerificationError = "failed to verify email address"
// EmailTokenGenerationError is an error messaged used when failing to generate a token
EmailTokenGenerationError = "failed to generate email verification token"
// ZoneSearchError is an error message used when failing to search for a zone
ZoneSearchError = "failed to search for zone"
// RecordSearchError is an error message used when failing to search for a record
RecordSearchError = "failed to search for record"
// IPFSDagGetError is an error message when failing to retrieve a dag from ipfs
IPFSDagGetError = "failed to get dag from ipfs"
// InvalidObjectIdentifierError is a generic error to indicate that the object identifier that was provided is invalid
InvalidObjectIdentifierError = "object identifier is of an invalid format"
// InvalidObjectTypeError is an error message when a user submits an incorrect type to be indexed
InvalidObjectTypeError = "object type is invalid, must be ipld"
// FailedToIndexError is an error message when a lens index request fails
FailedToIndexError = "an error occurred while trying to index this object"
// FailedToSearchError is an error message when a lens search request fails
FailedToSearchError = "an error occurred while submitting your search to lens"
// NoSearchResultsError is an error message used when no search results were returned
NoSearchResultsError = "there were no entries matching your search query"
// ChainRiderAPICallError is an error message used when a call to chainrider api fails
ChainRiderAPICallError = "failed to call chainrider api"
// KeyExportError is an error messaged used if a key export request fails
KeyExportError = "failed to export key"
// PasswordResetError is an error message used when an error occurins during password reset
PasswordResetError = "failed to reset password"
// NoAPITokenError is an error when we can't properly validate the jwt token
NoAPITokenError = "invalid token provided"
// CantUploadError is an error when a user tries to upload more data than their monthly limit
CantUploadError = "uploading would breach monthly data limit, please upload a smaller object"
// DataUsageUpdateError is an error when a failure occurs while trying to update a users
// current data usage
DataUsageUpdateError = "an error occurred while updating your account data usage"
// TierUpgradeError is an error when a failure to upgrade a user tier occurs
TierUpgradeError = "an error occurred upgrading your tier"
// EncryptionError is an error when a failure to encrypt data occurs
EncryptionError = "an error occurred when trying to encrypt file"
// DatabaseUpdateError is an error message used when a failure to update the database happesn
DatabaseUpdateError = "en error occurred wile updating the database"
// PinExtendError is an error message used when someone attempts to extend the pin for content they haven't uploaded
PinExtendError = "failed to extend pin duration, this likely means you haven't actually uploaded this content before"
// MaxHoldTimeError is an error message when the current hold time value would breach set pin time limits
MaxHoldTimeError = "a hold time of this long would result in a longer maximum pin time than what your account allow, please reduce your hold time and try again"
// HostNameNotFoundError is an error message when api server has not hostname
HostNameNotFoundError = "an api host has not hostname, please set hostname"
)
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
RTradeLtd/Temporal | https://github.com/RTradeLtd/Temporal/blob/4547df5e64d9823c6f670da4261de9e6d7353fb8/eh/doc.go | eh/doc.go | // Package eh stands for "error handling", and provides error definitions
package eh
| go | MIT | 4547df5e64d9823c6f670da4261de9e6d7353fb8 | 2026-01-07T09:35:24.447786Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/main.go | main.go | package main
import (
"beaver/app/backend/backend_models"
"beaver/app/chat/chat_models"
"beaver/app/datasync/datasync_models"
"beaver/app/emoji/emoji_models"
"beaver/app/feedback/feedback_models"
"beaver/app/file/file_models"
"beaver/app/friend/friend_models"
"beaver/app/group/group_models"
"beaver/app/moment/moment_models"
"beaver/app/notification/notification_models"
"beaver/app/track/track_models"
"beaver/app/update/update_models"
"beaver/app/user/user_models"
"beaver/core"
"beaver/database"
"flag"
"fmt"
)
type Options struct {
DB bool
}
// go run main.go -db
func main() {
var opt Options
flag.BoolVar(&opt.DB, "db", false, "db")
flag.Parse()
if opt.DB {
db := core.InitGorm("root:123456@tcp(127.0.0.1:3306)/beaver?charset=utf8mb4&parseTime=True&loc=Local")
// 禁用外键检查
db.Exec("SET FOREIGN_KEY_CHECKS = 0")
defer db.Exec("SET FOREIGN_KEY_CHECKS = 1")
// 创建所有表
err := db.AutoMigrate(
// 基础表
&user_models.UserModel{},
&user_models.UserChangeLogModel{},
&friend_models.FriendModel{},
&friend_models.FriendVerifyModel{},
&chat_models.ChatMessage{},
&chat_models.ChatConversationMeta{},
&chat_models.ChatUserConversation{},
&file_models.FileModel{},
&moment_models.MomentModel{},
&moment_models.MomentLikeModel{},
&moment_models.MomentCommentModel{},
&emoji_models.EmojiPackage{},
&emoji_models.Emoji{},
&emoji_models.EmojiPackageEmoji{},
&emoji_models.EmojiPackageCollect{},
&emoji_models.EmojiCollectEmoji{},
&track_models.TrackBucket{},
&track_models.TrackEvent{},
&track_models.TrackLogger{},
&feedback_models.FeedbackModel{},
// 版本管理相关表
&update_models.UpdateApp{},
&update_models.UpdateArchitecture{},
&update_models.UpdateVersion{},
&update_models.UpdateStrategy{},
&update_models.UpdateReport{},
&datasync_models.DatasyncModel{},
&group_models.GroupModel{},
&group_models.GroupMemberModel{},
&group_models.GroupJoinRequestModel{},
&group_models.GroupMemberChangeLogModel{},
// 通知中心表
¬ification_models.NotificationEvent{},
¬ification_models.NotificationInbox{},
¬ification_models.NotificationRead{},
// 后台管理相关表
&backend_models.AdminUser{},
&backend_models.AdminSystemAuthority{},
&backend_models.AdminSystemAuthorityMenu{},
&backend_models.AdminSystemAuthorityUser{},
&backend_models.AdminSystemMenu{},
)
if err != nil {
fmt.Printf("表结构生成失败: %v\n", err)
return
}
fmt.Println("所有表结构生成成功")
database.InitAllData(db)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_models/chat_conversation_setting_model.go | app/chat/chat_models/chat_conversation_setting_model.go | package chat_models
import (
"beaver/common/models"
)
// 存储用户级别的会话设置(每个用户独立)
// 记录用户对会话的个性化操作(置顶、免打扰、删除等)
// 记录用户在该会话中的已读状态
// 用于UI显示(会话列表、未读消息等)
type ChatUserConversation struct {
models.Model
UserID string `gorm:"size:64;index" json:"userId"` // 用户ID
ConversationID string `gorm:"size:128;index" json:"conversationId"` // 关联的会话ID
IsHidden bool `gorm:"default:false" json:"isHidden"` // 是否在当前用户的会话列表隐藏
IsPinned bool `gorm:"default:false" json:"isPinned"` // 置顶
IsMuted bool `gorm:"default:false" json:"isMuted"` // 免打扰
UserReadSeq int64 `gorm:"not;default:0" json:"userReadSeq"` // 当前用户已读游标
Version int64 `gorm:"not;default:0;index" json:"version"` // 用户会话设置版本,用于多端同步(基于UserID递增,所有会话设置共享版本号,从1开始)
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_models/chat_datasync_model.go | app/chat/chat_models/chat_datasync_model.go | package chat_models
import (
"beaver/common/models"
)
// 存储会话级别的信息(所有用户共享)
// 记录会话类型(私聊/群聊)
// 记录会话的最新消息序列号
// 用于数据同步(客户端需要知道哪些会话有更新)
// ChatConversationMeta 数据同步模型
type ChatConversationMeta struct {
models.Model
ConversationID string `gorm:"size:128;uniqueIndex" json:"conversationId"` // 唯一会话ID(私聊/群聊/系统)
Type int `gorm:"not" json:"type"` // 1=私聊 2=群聊 3=系统会话
MaxSeq int64 `gorm:"not;default:0" json:"maxSeq"` // 会话全局最新消息序号
LastMessage string `gorm:"size:256" json:"lastMessage"` // 会话最后一条消息预览(全局唯一)
Version int64 `gorm:"not;default:0;index" json:"version"` // 会话元信息版本,用于同步(基于ConversationID递增,从1开始)
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_models/chat_model.go | app/chat/chat_models/chat_model.go | package chat_models
import (
"beaver/common/models"
"beaver/common/models/ctype"
)
type ChatMessage struct {
models.Model
MessageID string `gorm:"size:64;uniqueIndex" json:"messageId"` // 唯一消息ID(客户端生成+服务端确认)
ConversationID string `gorm:"size:128;index" json:"conversationId"` // 所属会话ID
ConversationType int `gorm:"not" json:"conversationType"` // 会话类型(1=私聊 2=群聊)
Seq int64 `gorm:"not;default:0;index" json:"seq"` // 消息在会话内的序列号(基于ConversationID递增,从1开始)
SendUserID *string `gorm:"size:64;index" json:"sendUserId,omitempty"` // 发送者用户ID(通知消息可为null)
MsgType ctype.MsgType `gorm:"not" json:"msgType"` // 消息类型(TEXT/IMAGE/VIDEO/REVOKE/DELETE/EDIT等)
TargetMessageID string `gorm:"size:64;index" json:"targetMessageId,omitempty"` // 针对的原消息ID(撤回/删除/编辑事件)
MsgPreview string `gorm:"size:256" json:"msgPreview"` // 消息预览文本
Msg *ctype.Msg `gorm:"type:json" json:"msg"` // 消息内容(JSON)
// 数据状态管理 - 处理违规内容等情况
Status int8 `gorm:"not null;default:1;index" json:"status"` // 消息状态:1=正常 2=违规待审核 3=违规已屏蔽 4=已删除
}
func (chat ChatMessage) MsgPreviewMethod() string {
switch chat.Msg.Type {
case 1:
return chat.Msg.TextMsg.Content
case 2:
return "[图片消息]"
case 3:
return "[视频消息]"
case 4:
return "[文件消息]"
case 5:
return "[语音消息]"
case 6:
return "[表情消息]"
case 7:
return "[通知消息]"
case 8:
return "[音频文件]"
default:
return "[未知消息]"
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_utils/sync_utils.go | app/chat/chat_utils/sync_utils.go | package chat_utils
import (
"strings"
"time"
"beaver/app/chat/chat_models"
core "beaver/core/version"
"github.com/zeromicro/go-zero/core/logx"
"gorm.io/gorm"
)
// CreateOrUpdateConversation 更新会话信息,返回新版本号(表记录肯定存在)
func CreateOrUpdateConversation(db *gorm.DB, versionGen *core.VersionGenerator, conversationID string, conversationType int, lastSeq int64, lastMessage string) (int64, error) {
// 生成新版本号
version := versionGen.GetNextVersion("chat_conversation_metas", "conversation_id", conversationID)
// 直接更新会话信息
err := db.Model(&chat_models.ChatConversationMeta{}).
Where("conversation_id = ?", conversationID).
Updates(map[string]interface{}{
"max_seq": lastSeq,
"last_message": lastMessage,
"version": version,
"updated_at": time.Now(),
}).Error
if err != nil {
logx.Errorf("更新会话信息失败: conversationID=%s, error=%v", conversationID, err)
return 0, err
}
logx.Infof("更新会话信息成功: conversationID=%s, version=%d", conversationID, version)
return version, nil
}
// UpdateUserConversation 更新用户会话关系,返回新版本号(表记录肯定存在)
func UpdateUserConversation(db *gorm.DB, versionGen *core.VersionGenerator, userID, conversationID string, isDeleted bool) (int64, error) {
// 生成新版本号
version := versionGen.GetNextVersion("chat_user_conversations", "user_id", userID)
// 准备更新字段
updateFields := map[string]interface{}{
"updated_at": time.Now(),
"version": version,
}
if !isDeleted {
// 发送消息时自动恢复显示(取消隐藏状态)
updateFields["is_hidden"] = false
}
// 直接更新用户会话关系
err := db.Model(&chat_models.ChatUserConversation{}).
Where("conversation_id = ? AND user_id = ?", conversationID, userID).
Updates(updateFields).Error
if err != nil {
logx.Errorf("更新用户会话关系失败: userID=%s, conversationID=%s, error=%v", userID, conversationID, err)
return 0, err
}
if !isDeleted {
logx.Infof("更新用户会话关系成功并自动恢复显示: userID=%s, conversationID=%s, version=%d", userID, conversationID, version)
} else {
logx.Infof("更新用户会话关系成功: userID=%s, conversationID=%s, version=%d", userID, conversationID, version)
}
return version, nil
}
// UpdateAllUserConversationsInChat 更新聊天中所有用户的会话关系,返回所有用户的更新信息(表记录肯定存在)
func UpdateAllUserConversationsInChat(db *gorm.DB, versionGen *core.VersionGenerator, conversationID, senderID string, messageSeq int64) ([]UserConversationUpdate, error) {
// 查询该会话相关的所有用户会话记录
var userConversations []chat_models.ChatUserConversation
err := db.Where("conversation_id = ?", conversationID).Find(&userConversations).Error
if err != nil {
logx.Errorf("查询会话用户关系失败: conversationID=%s, error=%v", conversationID, err)
return nil, err
}
var updates []UserConversationUpdate
// 更新每条记录,每个用户独立版本号
for _, convo := range userConversations {
// 总是更新版本号,因为发送消息会影响所有用户的会话状态
version := versionGen.GetNextVersion("chat_user_conversations", "user_id", convo.UserID)
updateFields := map[string]interface{}{
"updated_at": time.Now(),
"version": version,
}
// 如果是隐藏状态,自动恢复显示
if convo.IsHidden {
updateFields["is_hidden"] = false
}
// 处理已读序列号更新
shouldUpdateReadSeq := false
if senderID == "*" {
// "*"表示所有用户都标记为已读
shouldUpdateReadSeq = true
} else {
// 检查用户是否在已读用户列表中(senderID可能包含多个用户ID,用逗号分隔)
readUserIDs := strings.Split(senderID, ",")
for _, readUserID := range readUserIDs {
if strings.TrimSpace(readUserID) == convo.UserID {
shouldUpdateReadSeq = true
break
}
}
}
if shouldUpdateReadSeq {
updateFields["user_read_seq"] = messageSeq
logx.Infof("更新用户已读序列号: userID=%s, conversationID=%s, readSeq=%d, version=%d", convo.UserID, conversationID, messageSeq, version)
}
// 直接批量更新所有用户的会话关系
err = db.Model(&chat_models.ChatUserConversation{}).
Where("conversation_id = ? AND user_id = ?", conversationID, convo.UserID).
Updates(updateFields).Error
if err != nil {
logx.Errorf("更新用户会话失败: userID=%s, conversationID=%s, error=%v", convo.UserID, conversationID, err)
// 继续处理其他用户,不要因为一个失败而中断整个流程
} else {
updates = append(updates, UserConversationUpdate{
UserID: convo.UserID,
ConversationID: conversationID,
Version: version,
})
}
}
logx.Infof("更新会话用户关系成功: conversationID=%s, 更新用户数=%d", conversationID, len(updates))
return updates, nil
}
// UpdateUserConversationsReadSeq 更新用户会话的已读序列号
func UpdateUserConversationsReadSeq(db *gorm.DB, versionGen *core.VersionGenerator, conversationID string, readUserIDs []string, readSeq int64) ([]UserConversationUpdate, error) {
// 查询该会话相关的所有用户会话记录
var userConversations []chat_models.ChatUserConversation
err := db.Where("conversation_id = ?", conversationID).Find(&userConversations).Error
if err != nil {
logx.Errorf("查询会话用户关系失败: conversationID=%s, error=%v", conversationID, err)
return nil, err
}
var updates []UserConversationUpdate
// 更新每条记录,每个用户独立版本号
for _, convo := range userConversations {
// 总是更新版本号,因为发送消息会影响所有用户的会话状态
version := versionGen.GetNextVersion("chat_user_conversations", "user_id", convo.UserID)
updateFields := map[string]interface{}{
"updated_at": time.Now(),
"version": version,
}
// 如果是隐藏状态,自动恢复显示
if convo.IsHidden {
updateFields["is_hidden"] = false
}
// 处理已读序列号更新
shouldUpdateReadSeq := false
if len(readUserIDs) == 0 {
// 如果readUserIDs为空,所有用户都标记为已读
shouldUpdateReadSeq = true
} else {
// 如果指定了readUserIDs,只有这些用户标记为已读
for _, readUserID := range readUserIDs {
if readUserID == convo.UserID {
shouldUpdateReadSeq = true
break
}
}
}
if shouldUpdateReadSeq {
updateFields["user_read_seq"] = readSeq
logx.Infof("更新用户已读序列号: userID=%s, conversationID=%s, readSeq=%d, version=%d", convo.UserID, conversationID, readSeq, version)
}
// 直接批量更新所有用户的会话关系
err = db.Model(&chat_models.ChatUserConversation{}).
Where("conversation_id = ? AND user_id = ?", conversationID, convo.UserID).
Updates(updateFields).Error
if err != nil {
logx.Errorf("更新用户会话失败: userID=%s, conversationID=%s, error=%v", convo.UserID, conversationID, err)
// 继续处理其他用户,不要因为一个失败而中断整个流程
} else {
updates = append(updates, UserConversationUpdate{
UserID: convo.UserID,
ConversationID: conversationID,
Version: version,
})
}
}
return updates, nil
}
// UserConversationUpdate 用户会话更新信息
type UserConversationUpdate struct {
UserID string
ConversationID string
Version int64
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/chat.go | app/chat/chat_api/chat.go | package main
import (
"beaver/app/chat/chat_api/internal/config"
"beaver/app/chat/chat_api/internal/handler"
"beaver/app/chat/chat_api/internal/svc"
"beaver/common/etcd"
"beaver/common/middleware"
"flag"
"fmt"
"github.com/zeromicro/go-zero/core/conf"
"github.com/zeromicro/go-zero/rest"
)
var configFile = flag.String("f", "etc/chat.yaml", "the config file")
func main() {
flag.Parse()
var c config.Config
conf.MustLoad(*configFile, &c)
server := rest.MustNewServer(c.RestConf)
defer server.Stop()
ctx := svc.NewServiceContext(c)
handler.RegisterHandlers(server, ctx)
// 添加请求日志中间件
server.Use(middleware.RequestLogMiddleware)
etcd.DeliveryAddress(c.Etcd, c.Name+"_api", fmt.Sprintf("%s:%d", c.Host, c.Port))
fmt.Printf("Starting server at %s:%d...\n", c.Host, c.Port)
server.Start()
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/svc/servicecontext.go | app/chat/chat_api/internal/svc/servicecontext.go | package svc
import (
"beaver/app/chat/chat_api/internal/config"
"beaver/app/chat/chat_rpc/chat"
"beaver/app/chat/chat_rpc/types/chat_rpc"
"beaver/app/friend/friend_rpc/friend"
"beaver/app/friend/friend_rpc/types/friend_rpc"
"beaver/app/group/group_rpc/group"
"beaver/app/group/group_rpc/types/group_rpc"
"beaver/app/user/user_rpc/types/user_rpc"
"beaver/app/user/user_rpc/user"
"beaver/common/zrpc_interceptor"
"beaver/core"
versionPkg "beaver/core/version"
"github.com/go-redis/redis"
"github.com/zeromicro/go-zero/zrpc"
"gorm.io/gorm"
)
type ServiceContext struct {
Config config.Config
Redis *redis.Client
UserRpc user_rpc.UserClient
ChatRpc chat_rpc.ChatClient
FriendRpc friend_rpc.FriendClient
GroupRpc group_rpc.GroupClient
DB *gorm.DB
VersionGen *versionPkg.VersionGenerator
}
func NewServiceContext(c config.Config) *ServiceContext {
mysqlDb := core.InitGorm(c.Mysql.DataSource)
client := core.InitRedis(c.Redis.Addr, c.Redis.Password, c.Redis.Db)
versionGen := versionPkg.NewVersionGenerator(client, mysqlDb)
return &ServiceContext{
DB: mysqlDb,
Redis: client,
Config: c,
UserRpc: user.NewUser(zrpc.MustNewClient(c.UserRpc, zrpc.WithUnaryClientInterceptor(zrpc_interceptor.ClientInfoInterceptor))),
ChatRpc: chat.NewChat(zrpc.MustNewClient(c.ChatRpc, zrpc.WithUnaryClientInterceptor(zrpc_interceptor.ClientInfoInterceptor))),
FriendRpc: friend.NewFriend(zrpc.MustNewClient(c.FriendRpc, zrpc.WithUnaryClientInterceptor(zrpc_interceptor.ClientInfoInterceptor))),
GroupRpc: group.NewGroup(zrpc.MustNewClient(c.GroupRpc, zrpc.WithUnaryClientInterceptor(zrpc_interceptor.ClientInfoInterceptor))),
VersionGen: versionGen,
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/types/types.go | app/chat/chat_api/internal/types/types.go | // Code generated by goctl. DO NOT EDIT.
package types
type AudioFileMsg struct {
FileKey string `json:"fileKey"` //音频文件ID
FileName string `json:"fileName,optional"` //原始文件名(可选,用于显示)
Duration int `json:"duration,optional"` //音频时长(秒,可选)
Size int64 `json:"size,optional"` //文件大小(字节,可选)
}
type ChatHistoryReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId"` // 会话Id
Page int `json:"page,optional"`
Limit int `json:"limit,optional"`
}
type ChatHistoryRes struct {
Count int64 `json:"count"`
List []Message `json:"list"`
}
type ChatSyncMessage struct {
MessageID string `json:"messageId"` //客户端消息ID
ConversationID string `json:"conversationId"` //会话id
ConversationType int `json:"conversationType"` //会话类型(1=私聊 2=群聊)
SendUserID string `json:"sendUserId"` //发送者用户ID
MsgType uint32 `json:"msgType"` //消息类型
MsgPreview string `json:"msgPreview"` //消息预览
Msg string `json:"msg"` //消息内容JSON字符串
IsDeleted bool `json:"isDeleted"` //是否已删除
Seq int64 `json:"seq"` //序列号,用于数据同步
CreatedAt int64 `json:"createdAt"` //创建时间戳
}
type ChatSyncReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId,optional"` // 会话ID,可选,不传则同步所有会话
FromSeq int64 `json:"fromSeq"` // 起始序列号
ToSeq int64 `json:"toSeq"` // 结束序列号
Limit int `json:"limit,optional"` // 限制数量,默认100
}
type ChatSyncRes struct {
Messages []ChatSyncMessage `json:"messages"` // 消息列表
HasMore bool `json:"hasMore"` // 是否还有更多数据
NextSeq int64 `json:"nextSeq"` // 下次同步的起始序列号
}
type ConversationById struct {
ConversationID string `json:"conversationId"` // 会话ID
Type int `json:"type"` // 会话类型 1=私聊 2=群聊 3=系统会话
MaxSeq int64 `json:"maxSeq"` // 会话消息的最大Seq
LastMessage string `json:"lastMessage"` // 会话最后一条消息预览
Version int64 `json:"version"` // 版本号
CreatedAt int64 `json:"createdAt"` // 创建时间戳
UpdatedAt int64 `json:"updatedAt"` // 更新时间戳
}
type ConversationInfoReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId"` //会话id
}
type ConversationInfoRes struct {
Avatar string `json:"avatar"`
NickName string `json:"nickName"`
MsgPreview string `json:"msg_preview"` //消息预览
UpdatedAt string `json:"updated_at"` //消息时间
IsTop bool `json:"is_top"` //是否置顶
ConversationID string `json:"conversationId"` //会话id
ChatType int `json:"chatType"` //会话类型 1:好友 2:群聊 3:AI机器人
Notice string `json:"notice"` //备注
}
type DeleteRecentReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId"` //会话id
}
type DeleteRecentRes struct {
}
type EditMessageReq struct {
UserID string `header:"Beaver-User-Id"`
MessageID string `json:"messageId"` //客户端消息ID
Content string `json:"content"` //新的消息内容
}
type EditMessageRes struct {
Id uint `json:"id"` //数据库自增ID
MessageID string `json:"messageId"` //客户端消息ID
Content string `json:"content"` //编辑后的内容
EditTime string `json:"editTime"` //编辑时间
}
type EmojiMsg struct {
FileKey string `json:"fileKey"` // 表情图片文件ID(Emoji.FileName)
EmojiID string `json:"emojiId"` // 表情ID(Emoji.Id,单个表情时使用)
PackageID string `json:"packageId"` // 表情包ID(EmojiPackage.Id,表情包分享时使用)
}
type FileMsg struct {
FileKey string `json:"fileKey"` //文件ID
FileName string `json:"fileName,optional"` //原始文件名(可选,用于显示)
Size int64 `json:"size,optional"` //文件大小(字节,可选)
MimeType string `json:"mimeType,optional"` //MIME类型(可选,如 application/pdf)
}
type ForwardMessageReq struct {
UserID string `header:"Beaver-User-Id"`
MessageID string `json:"messageId"` //客户端消息ID
TargetID string `json:"targetId"` // 目标会话ID
ForwardType int `json:"forwardType"` // 1: 单聊 2: 群聊
}
type ForwardMessageRes struct {
Id uint `json:"id"` //数据库自增ID
MessageID string `json:"messageId"` //客户端消息ID
ForwardTime string `json:"forwardTime"`
}
type GetConversationsListByIdsReq struct {
UserID string `header:"Beaver-User-Id"` // 用户ID
ConversationIds []string `json:"conversationIds"` // 会话ID列表
}
type GetConversationsListByIdsRes struct {
Conversations []ConversationById `json:"conversations"` // 会话列表
}
type GetUserConversationSettingsListByIdsReq struct {
UserID string `header:"Beaver-User-Id"` // 用户ID
ConversationIds []string `json:"conversationIds"` // 会话ID列表
}
type GetUserConversationSettingsListByIdsRes struct {
UserConversationSettings []UserConversationSettingById `json:"userConversationSettings"` // 用户会话设置列表
}
type HideChatReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId"` //会话id
IsHidden bool `json:"isHidden"` // true表示隐藏 false表示显示
}
type HideChatRes struct {
}
type ImageMsg struct {
FileKey string `json:"fileKey"` //图片文件ID
Width int `json:"width,optional"` //图片宽度(可选)
Height int `json:"height,optional"` //图片高度(可选)
Size int64 `json:"size,optional"` //文件大小(字节,可选)
}
type Message struct {
Id uint `json:"id"` //数据库自增ID
MessageID string `json:"messageId"` //客户端消息ID
ConversationID string `json:"conversationId"` //会话id
ConversationType int `json:"conversationType"` //会话类型(1=私聊 2=群聊)
Msg Msg `json:"msg"`
Sender Sender `json:"sender"` //发送者
CreatedAt string `json:"created_at"` //消息时间
Status uint32 `json:"status"` //消息状态 1:正常 2:已撤回 3:已编辑
Seq int64 `json:"seq"` //序列号,用于数据同步
}
type Msg struct {
Type uint32 `json:"type"` //消息类型 1:文本 2:图片 3:视频 4:文件 5:语音 6:表情 7:通知消息 8:音频文件
TextMsg *TextMsg `json:"textMsg,optional"` //文本消息
ImageMsg *ImageMsg `json:"imageMsg,optional"` //图片
VideoMsg *VideoMsg `json:"videoMsg,optional"` //视频
FileMsg *FileMsg `json:"fileMsg,optional"` //文件
VoiceMsg *VoiceMsg `json:"voiceMsg,optional"` //语音
EmojiMsg *EmojiMsg `json:"emojiMsg,optional"` //表情
NotificationMsg *NotificationMsg `json:"notificationMsg,optional"` //通知消息(会话内的通知,如:xxx加入了群聊、xxx创建了群等)
AudioFileMsg *AudioFileMsg `json:"audioFileMsg,optional"` //音频文件
ReplyMsg *ReplyMsg `json:"replyMsg,optional"` //回复消息
}
type MuteChatReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId"` //会话id
IsMuted bool `json:"isMuted"` // true表示免打扰 false表示取消免打扰
}
type MuteChatRes struct {
}
type NotificationMsg struct {
Type int `json:"type"` // 通知类型:1=好友欢迎 2=创建群 3=加入群 4=退出群 5=踢出成员 6=转让群主等
Actors []string `json:"actors"` // 相关用户ID列表
}
type PinnedChatReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId"` //会话id
IsPinned bool `json:"isPinned"` // true表示置顶 false表示不置顶
}
type PinnedChatRes struct {
}
type RecallMessageReq struct {
UserID string `header:"Beaver-User-Id"`
MessageID string `json:"messageId"` //客户端消息ID
}
type RecallMessageRes struct {
Id uint `json:"id"` //数据库自增ID
MessageID string `json:"messageId"` //客户端消息ID
RecallTime string `json:"recallTime"` //撤回时间
}
type RecentChatListReq struct {
UserID string `header:"Beaver-User-Id"`
Page int `form:"page,optional"`
Limit int `form:"limit,optional"`
}
type RecentChatListRes struct {
Count int64 `json:"count"`
List []ConversationInfoRes `json:"list"`
}
type ReplyMsg struct {
ReplyToMessageID string `json:"replyToMessageId"` // 被回复的消息ID
ReplyToContent string `json:"replyToContent"` // 被回复的消息内容预览
ReplyToSender string `json:"replyToSender"` // 被回复消息的发送者昵称
}
type SendMsgReq struct {
UserID string `header:"Beaver-User-Id"`
ConversationID string `json:"conversationId"` //会话id
MessageID string `json:"messageId"` //客户端消息ID
Msg Msg `json:"msg"`
}
type SendMsgRes struct {
Id uint `json:"id"` //数据库自增ID
MessageID string `json:"messageId"` //客户端消息ID
ConversationID string `json:"conversationId"` //会话id
Msg Msg `json:"msg"`
Sender Sender `json:"sender"` //发送者
CreatedAt string `json:"created_at"` //消息时间
MsgPreview string `json:"msgPreview"` //消息预览
Status uint32 `json:"status"` //消息状态 1:正常 2:已撤回 3:已编辑
Seq int64 `json:"seq"` //消息序列号,用于数据同步
}
type Sender struct {
UserID string `json:"userId"`
Avatar string `json:"avatar"`
NickName string `json:"nickName"`
}
type TextMsg struct {
Content string `json:"content"` //文本消息内容
}
type UpdateReadSeqReq struct {
UserID string `header:"Beaver-User-Id"` // 用户ID
ConversationID string `json:"conversationId"` // 会话ID
ReadSeq int64 `json:"readSeq"` // 已读序列号(用户已读到的消息seq)
}
type UpdateReadSeqRes struct {
Success bool `json:"success"` // 是否成功
}
type UserConversationSettingById struct {
UserID string `json:"userId"` // 用户ID
ConversationID string `json:"conversationId"` // 会话ID
IsHidden bool `json:"isHidden"` // 是否隐藏
IsPinned bool `json:"isPinned"` // 是否置顶
IsMuted bool `json:"isMuted"` // 是否免打扰
UserReadSeq int64 `json:"userReadSeq"` // 用户已读序列号
Version int64 `json:"version"` // 版本号
CreatedAt int64 `json:"createdAt"` // 创建时间戳
UpdatedAt int64 `json:"updatedAt"` // 更新时间戳
}
type VideoMsg struct {
FileKey string `json:"fileKey"` //视频文件ID
Width int `json:"width,optional"` //视频宽度(可选)
Height int `json:"height,optional"` //视频高度(可选)
Duration int `json:"duration,optional"` //视频时长(秒,可选)
ThumbnailKey string `json:"thumbnailKey,optional"` //视频封面图文件ID(可选)
Size int64 `json:"size,optional"` //文件大小(字节,可选)
}
type VoiceMsg struct {
FileKey string `json:"fileKey"` //语音文件ID
Duration int `json:"duration,optional"` //语音时长(秒,可选)
Size int64 `json:"size,optional"` //文件大小(字节,可选)
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/config/config.go | app/chat/chat_api/internal/config/config.go | package config
import (
"github.com/zeromicro/go-zero/rest"
"github.com/zeromicro/go-zero/zrpc"
)
type Config struct {
rest.RestConf
Mysql struct {
DataSource string
}
Redis struct {
Addr string
Password string
Db int
}
Etcd string
UserRpc zrpc.RpcClientConf
ChatRpc zrpc.RpcClientConf
FriendRpc zrpc.RpcClientConf
GroupRpc zrpc.RpcClientConf
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/hidechathandler.go | app/chat/chat_api/internal/handler/hidechathandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func hideChatHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.HideChatReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewHideChatLogic(r.Context(), svcCtx)
resp, err := l.HideChat(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/getuserconversationsettingslistbyidshandler.go | app/chat/chat_api/internal/handler/getuserconversationsettingslistbyidshandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func getUserConversationSettingsListByIdsHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.GetUserConversationSettingsListByIdsReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewGetUserConversationSettingsListByIdsLogic(r.Context(), svcCtx)
resp, err := l.GetUserConversationSettingsListByIds(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/recentchatlisthandler.go | app/chat/chat_api/internal/handler/recentchatlisthandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func recentChatListHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.RecentChatListReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewRecentChatListLogic(r.Context(), svcCtx)
resp, err := l.RecentChatList(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/editmessagehandler.go | app/chat/chat_api/internal/handler/editmessagehandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func editMessageHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.EditMessageReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewEditMessageLogic(r.Context(), svcCtx)
resp, err := l.EditMessage(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/deleterecenthandler.go | app/chat/chat_api/internal/handler/deleterecenthandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func deleteRecentHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.DeleteRecentReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewDeleteRecentLogic(r.Context(), svcCtx)
resp, err := l.DeleteRecent(&req)
response.Response(r, w, resp, err, "删除最近会话成功")
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/mutechathandler.go | app/chat/chat_api/internal/handler/mutechathandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func muteChatHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.MuteChatReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewMuteChatLogic(r.Context(), svcCtx)
resp, err := l.MuteChat(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/updatereadseqhandler.go | app/chat/chat_api/internal/handler/updatereadseqhandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func updateReadSeqHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.UpdateReadSeqReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewUpdateReadSeqLogic(r.Context(), svcCtx)
resp, err := l.UpdateReadSeq(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/sendmsghandler.go | app/chat/chat_api/internal/handler/sendmsghandler.go | package handler
import (
"errors"
"net/http"
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"github.com/zeromicro/go-zero/rest/httpx"
)
func SendMsgHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.SendMsgReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
// 验证必填参数
if req.UserID == "" {
response.Response(r, w, nil, errors.New("用户ID不能为空"))
return
}
if req.ConversationID == "" {
response.Response(r, w, nil, errors.New("会话ID不能为空"))
return
}
if req.MessageID == "" {
response.Response(r, w, nil, errors.New("消息ID不能为空"))
return
}
l := logic.NewSendMsgLogic(r.Context(), svcCtx)
resp, err := l.SendMsg(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/conversationinfohandler.go | app/chat/chat_api/internal/handler/conversationinfohandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func ConversationInfoHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.ConversationInfoReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewConversationInfoLogic(r.Context(), svcCtx)
resp, err := l.ConversationInfo(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
wsrh8888/beaver-server | https://github.com/wsrh8888/beaver-server/blob/71409b80d00457511f57d8fec96e7366a8520b60/app/chat/chat_api/internal/handler/chathistoryhandler.go | app/chat/chat_api/internal/handler/chathistoryhandler.go | package handler
import (
"beaver/app/chat/chat_api/internal/logic"
"beaver/app/chat/chat_api/internal/svc"
"beaver/app/chat/chat_api/internal/types"
"beaver/common/response"
"net/http"
"github.com/zeromicro/go-zero/rest/httpx"
)
func chatHistoryHandler(svcCtx *svc.ServiceContext) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) {
var req types.ChatHistoryReq
if err := httpx.Parse(r, &req); err != nil {
response.Response(r, w, nil, err)
return
}
l := logic.NewChatHistoryLogic(r.Context(), svcCtx)
resp, err := l.ChatHistory(&req)
response.Response(r, w, resp, err)
}
}
| go | MIT | 71409b80d00457511f57d8fec96e7366a8520b60 | 2026-01-07T09:45:42.639179Z | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.